Skip to main content

PS4 6.20 WebKit Code Execution Exploit PoC

PS4 6.20 WebKit Code Execution Exploit PoC


Proceeding the release of PS4 Firmware 6.50, his previous PS4 Exploit DocumentationGH Clone Demo, the 6.20 Dev Build Strings and 6.50 Dev Build Strings as promised today @SpecterDev released via Twitter a PS4 6.20 WebKit Code Execution Exploit PoC (Proof-of-Concept) using CVE-2018-4441 to obtain RCE crediting lokihardt for the vulnerability used.

From the Tweets below, he states that unlike the PS4 6.XX JSC_ConcatMemcpy WebKit Exploit which wasn't a complete exploit, this one grants code execution in userland for PS4 scene developers!
image: https://www.psxhax.com/styles/default/xenforo/clear.png
:lovexf2:

Download: PS4-6.20-WebKit-Code-Execution-Exploit-master.zip / GIT / Live Demo

image: https://www.psxhax.com/styles/default/xenforo/smilies/icon4.png
:alert: For newbs: This is a 6.20 PS4 WebKit (Userland) exploit and not a Kernel-level exploit, meaning until a fully implemented 6.20 Kernel exploit is publicly available you won't be able to jailbreak these PlayStation 4 consoles so don't update!
image: https://www.psxhax.com/styles/default/xenforo/smilies/icon3.png
:idea: Also for those that updated already, if you can't get a second jailbroken console to run PS4 game backups then while you're waiting for a PlayStation 4 jailbreak (no ETA) it's recommended to get a Verified Badge via Discord to access the private areas.

To quote from the README.mdPS4 6.20 WebKit Code Execution PoC

This repo contains a proof-of-concept (PoC) RCE exploit targeting the PlayStation 4 on firmware 6.20 leveraging CVE-2018-4441. The exploit first establishes an arbitrary read/write primitive as well as an arbitrary object address leak in wkexploit.js.

It will then setup a framework to run ROP chains in index.html and by default will provide two hyperlinks to run test ROP chains - one for running the sys_getpid() syscall, and the other for running the sys_getuid() syscall to get the PID and user ID of the process respectively.

Each file contains a comment at the top giving a brief explanation of what the file contains and how the exploit works. Credit for the bug discovery is to lokihardt from Google Project Zero (p0). The bug report can be found here.

Note: It's been patched in the 6.50 firmware update.

Files
Files in order by name alphabetically;
  • index.html - Contains post-exploit code, going from arb. R/W -> code execution.
  • rop.js - Contains a framework for ROP chains.
  • syscalls.js - Contains an (incomplete) list of system calls to use for post-exploit stuff.
  • wkexploit.js - Contains the heart of the WebKit exploit.
Notes
  • This vulnerability was patched in 6.50 firmware!
  • This only gives you code execution in userland. This is not a jailbreak nor a kernel exploit, it is only the first half.
  • This exploit targets firmware 6.20. It should work on lower firmwares however the gadgets will need to be ported, and the p.launchchain() method for code execution may need to be swapped out.
  • In my tests the exploit as-is is pretty stable, but it can become less stable if you add a lot of objects and such into the exploit. This is part of the reason why syscalls.js contains only a small number of system calls.
Usage
Setup a web-server hosting these files on localhost using xampp or any other program of your choosing. Additionally, you could host it on a server. You can access it on the PS4 by either;
  1. Fake DNS spoofing to redirect the manual page to the exploit page, or
  2. Using the web browser to navigate to the exploit page (not always possible).
Vulnerability Credit
I wrote the exploit however I did not find the vulnerability, as mentioned above the bug (CVE-2018-4441) was found by lokihardt from Google Project Zero (p0) and was disclosed via the Chromium public bug tracker.

Resources
Thanks
  • lokihardt - The vulnerability
  • st4rk - Help with the exploit
  • qwertyoruiop - WebKit School
  • saelo - Phrack paper

Comments

Popular posts from this blog

PS4 CFW: PS4 Jailbreak, PS4 Exploit 5.05/5.07/5.55/6.20/6.02

PS4 Jailbreak PS4 Exploit  5.05/5.07/5.55/6.20/6.02 GAMECRACKERS What is  PS4 Jailbreak ?  How to Jailbreak your  PS4 ?  What is  PS4 CFW ?  How does  PS4 Exploit  works?  If you want answers to these questions then make sure to  bookmark  this page as it is kept updated with easy and reliable solutions directly from the hacking scene. GAMECRACKERS  is proud to provide you PS4 Jailbreak and PS4 Exploit with complete guide and professional tools to jailbreak or install exploit on your PS4  for free .  PS4 Jailbreak. Sony  has released the latest firmware 6.50 for  Sony  PlayStation 4. PS4 firmware's 5.05/5.07 or below are hacked so can be jailbreak.If you have updated your Firmware to  6.50/6.20/6.02  don’t worry then because you can still install PS4 Exploit on your PlayStation 4. PS4 Jailbreak allows player some great advantages over original Sony firmware,...

Xbox One Controller Traces, Diagram, Scan and Pinouts

  The new XB1 controller is a CG (Common Ground) setup for all of the Buttons. The Triggers are also in a setup where they go Lo when pressed, but they are a bit more complex than the 10k Potentiometer style that its 360 predecessor sported, more detail on those later. 1537 BUTTON/POWER BOARD TOP 1537 BUTTON/POWER BOARD BOTTOM 1537 MCU BOARD TOP 1537 MCU BOARD BOTTOM If any button is wished to be duplicated, it's just a matter of one side of the new button going to any Ground spot, then the other side going to the button line that you want to duplicate. The connectors J5 and J6 are the best place to solder up wires for all of the buttons, with the exceptions of B, LSC and RSC. The B button has a Via, as well as a solder pad at D14 directly beneath it that can be used. Then the LSC and RSC connections can be made right on the solder joints for them. If a Trigger is wished to be duplicated, it will get done the same way, one side of the new button will go to Ground, the other side to...

Unveiling the Potential of a Leaked "PS5 DualSense Checker" Offline Tool: A Deep Dive into its Diagnostic Capabilities

Leaked PS5 DualSense Checker: A Potential Game-Changer for Controller Diagnostics?  Recently, files reportedly used by Sony for internal PS5 repairs have surfaced online, sparking considerable interest within the gaming community. Among these files is a purported "PS5 DualSense Checker" tool, an offline application designed to diagnose issues with the popular DualSense controller. While official details remain scarce, the alleged capabilities of this tool have raised intriguing possibilities for users. What We've Heard About the Leaked Tool: According to information circulating online, this leaked software is intended for offline use, meaning it doesn't require an internet connection to function. It's described as a diagnostic application designed to assess the full functionality of the DualSense controller. Reports suggest it can potentially test: Button Responsiveness: Ensuring all buttons register inputs correctly and identifying any unresponsive or malfunctio...