metasploit-framework/external/source/exploits/CVE-2020-9850
Tim W 301754c648 remove CMakeLists.txt 2020-09-01 17:14:21 +08:00
..
payload remove CMakeLists.txt 2020-09-01 17:14:21 +08:00
.gitignore CVE-2020-9850 external source 2020-08-14 16:10:40 +08:00
Makefile fix source versions and jscell headers 2020-08-27 19:36:45 +08:00
README.md fix source versions and jscell headers 2020-08-27 19:36:45 +08:00

README.md

Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities

Overview

This repository contains exploitation and technical details of our Pwn2Own 2020 winning submission targeting Apple Safari with a kernel escalation of privilege for macOS 10.15.3. For further information, you can also check our Blackhat USA 2020 slides. This repository also includes our demo video for the succesful exploitation.

Build from source

# Install xcode first
$ python3 -m pip install --user "lief==0.10.1"
$ make

Authors

Citation

@inproceedings{jin:pwn2own2020-safari,
  title        = {{Compromising the macOS kernel through Safari by chaining six vulnerabilities}},
  author       = {Yonghwi Jin and Jungwon Lim and Insu Yun and Taesoo Kim},
  booktitle    = {Black Hat USA Briefings (Black Hat USA)},
  month        = aug,
  year         = 2020,
  address      = {Las Vegas, NV},
}

Reference