mirror of
https://github.com/ChendoChap/pOOBs4.git
synced 2024-10-05 14:47:13 +02:00
30 lines
1.7 KiB
Markdown
30 lines
1.7 KiB
Markdown
# PS4 9.00 Kernel Exploit
|
|
---
|
|
## Summary
|
|
In this project you will find an implementation that tries to make use of a filesystem bug for the Playstation 4 on firmware 9.00.
|
|
The bug was found while diffing the 9.00 and 9.03 kernels. It will require a drive with a modified exfat filesystem. Successfully triggering it will allow you to run arbitrary code as kernel, to allow jailbreaking and kernel-level modifications to the system. will launch the usual payload launcher (on port 9020).
|
|
|
|
## Patches Included
|
|
The following patches are applied to the kernel:
|
|
1) Allow RWX (read-write-execute) memory mapping (mmap / mprotect)
|
|
2) Syscall instruction allowed anywhere
|
|
3) Dynamic Resolving (`sys_dynlib_dlsym`) allowed from any process
|
|
4) Custom system call #11 (`kexec()`) to execute arbitrary code in kernel mode
|
|
5) Allow unprivileged users to call `setuid(0)` successfully. Works as a status check, doubles as a privilege escalation.
|
|
6) (`sys_dynlib_load_prx`) patch
|
|
7) Disable delayed panics from sysVeri
|
|
## Notes
|
|
- You need to insert the USB when the alert pops up, then let it sit there for a bit until the ps4 storage notifications shows up.
|
|
- Unplug the USB before a (re)boot cycle or you'll risk corrupting the kernel heap at boot.
|
|
- The browser might tempt you into closing the page prematurely, don't.
|
|
- The loading circle might freeze while the webkit exploit is triggering, this means nothing.
|
|
|
|
## Contributors
|
|
|
|
- laureeeeeee
|
|
- [Specter](https://twitter.com/SpecterDev)
|
|
- [Znullptr](https://twitter.com/Znullptr)
|
|
|
|
## Special Thanks
|
|
- [Andy Nguyen](https://twitter.com/theflow0)
|
|
- [sleirsgoevy](https://twitter.com/sleirsgoevy) - [9.00 Webkit exploit](https://gist.github.com/sleirsgoevy/6beca32893909095f4bba1ce29167992) |