Just In Time
is a an exploitation challenge written by Stephen 'tsuro' Röttger for Google CTF 2018.
I wrote an introduction to TurboFan article on doare-e.github.io that explains the bug and its exploitation.
When working on v8, I use a customized engine for which I added some features. One of those is available on my other repo.
You may also want to have a look at a few experiments.
For just-in-time
, you are provided with a modified v8 engine.
It contains a vulnerable TurboFan reduction (understand : optimization pass).
This reduction tries to (incorrectly) optimize duplicate additions such as x + 1 + 2
.
This repository contains a full exploit for this bug. It also uses WebAssembly to get RWX memory.