Editing Vulnerabilities
Jump to navigation
Jump to search
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 5: | Line 5: | ||
=== FW <= 7.61 - BD-JB2 - Path traversal sandbox escape by TheFloW === | === FW <= 7.61 - BD-JB2 - Path traversal sandbox escape by TheFloW === | ||
==== Credits ==== | |||
* CTurt for the idea based on FreeDVDBoot for PS2 | |||
* TheFloW for the exploits finding, ethical disclose to SCE (2023-09-22) and public disclosure (2023-10-25) | |||
* psxdev, sleirsgoevy and John Törnblom for the public implementations | |||
==== Bug Description ==== | |||
Basing on BD-JB1 exploit files, in /bdmv/bdjo.xml changing bdjo/applicationManagementTable/baseDirectory to a path of the form `file:///app0/cdc/lib/../../../disc/BDMV/JAR/00000.jar` allows loading a JAR Java executable file. | |||
==== Implementations ==== | |||
* [https://twitter.com/theflow0/status/1717088032031982066 PoC by TheFloW (2023-10-25)] | |||
==== Patched ==== | ==== Patched ==== | ||
Line 13: | Line 25: | ||
=== FW <= 4.51 - BD-JB - Five vulnerabilities chained by TheFloW === | === FW <= 4.51 - BD-JB - Five vulnerabilities chained by TheFloW === | ||
See [https:// | ==== Credits ==== | ||
* CTurt for the idea based on FreeDVDBoot for PS2 | |||
* TheFlow for the exploits finding and public disclosure. See [https://twitter.com/theflow0/status/1457362920501829636 TheFloW's PS5 kernel exploit announcement (2021-11-07)]. | |||
* psxdev, sleirsgoevy and John Törnblom for the public implementations | |||
==== Implementations ==== | ==== Implementations ==== |