Un exploit natif Vita à venir !

C'est une première ! Au lieu des habituels exploits de l'émulateur PSP, nous aurons droit bientôt à un exploit natif PS Vita, un peu comme c'est arrivé sur Wii U.


Cet exploit utilisera une faille présente sur webkit, le moteur de rendu du navigateur de la console PS Vita.
Plusieurs raisons font que cet exploit va sortir. Tout d'abord, la récente publication d'un nombre ahurissant de failles PSP (due au fait que les hackeurs veulent aller de l'avant et arrêter de rester coincé dans ce mode PSP), mais également parce que Sony va bientôt mettre à jour Webkit sur sa vita... ce qui va corriger la faille utilisée.

La personne ayant mit en place l'exploit est CodeLion et y travaille depuis quelques mois. Etant donné que la prochaine mise à jour (ou celle d'après) corrigera la faille, il n'était pas utile de continuer à la garder pour lui.

Plus loin vous avez l'explication technique, dans laquelle il montre qu'il manque un ROP compiler, un SDK et des développeurs désireux de coder des programmes avec l'exploit.
Ils ont aussi un élément à contourner avant de pouvoir hacker la console, le NID poisoning dont nous aurons plus d'infos plus tard.

Ne faites donc pas la mise à jour 3.20 quand elle sortira !

Voici le message complet de CodeLion :

Quote:
Hey everyone
Shortly ago Acid_Snake posted about the state of the Vita scene, calling to the forefront yifan’s recommendations to go after webkit.
Well you may all be in for some good news. Around July of this year, I returned to the scene after a while’s absence and decided to dedicate myself to webkit. I founded a new team dedicated solely to hacking the native side of the vita, codenamed Project Mayhem and eventually named “team mayh3m.”
Over a period of 3 months we have been able to get nearly all the way through the process of exploiting webkit. The purpose of this post is to encourage you not to update to 3.20 if you desire to work with webkit, as well as to bring other developers up to speed in terms of where we are in the exploiting process. I will not be covering the basics of ASLR, DEP, ROP, or other security concepts in this paper. If you need to learn those you will want to study the “useful links” section.

The following link gives you a good idea of the difficulty and ease of exploiting webkit:
https://labs.mwrinfosecurity.com/blog/2013/04/19/mwr-labs-pwn2own-2013-write-up—webkit-exploit/

Unfortunately the vita is not vulnerable to that exploit, however, I was able to find several other exploitable bugs in the vita webkit source. We currently have the ability to execute a single ARM instruction, 0xE7FE, which is equivilent to “while (1) {}”. This is a classic proof of code execution as it causes the program to hang without crashing. It hangs in a very “clean” way as it were. I will be releasing the exploits required to get to that point as soon as Sony patches them. A patch is anticipated in 3.20 as it looks as if sony is going to be pushing for parity with the browser on the playstation 4.

We also have the ability to dump the ram of the browser process. This is approximately equivalent to psplink’s savemem function. We are currently slightly stymied by ASLR, but expect to have full dumps of the process memory very soon.

The two exploits can be combined to begin a ROP chain to bypass aslr and dep. In theory, unsigned code running on the vita in usermode is only a few steps away.

I’ve got a collection of links and information below for you. The workflow should be as follows:
Search through CVE reports and bugtracker information for various webkit ports and find exploits that look promising (and have been patched in the latest version)
Look at the changelog to determine how the code has been changed to patch the exploit
Check if sony’s webkit source has been patched for the exploit
Download or create a test for the exploit and run it on the vita
If you get a reload loop (the vita browser will turn grey and say “please wait”) the browser is vulnerable to that exploit!
Now go figure out how to exploit it! I’m not gonna give you everything haha…

What you will need to help with the vita exploiting process:
SceWebkit source: http://www.scei.co.jp/psvita-license/webkit.html
Apache Server: http://www.wampserver.com/en/
A vita: http://www.amazon.com/PlayStation-Vita-Wifi/dp/B003O6EATE/ref=sr_1_2?ie=UTF8&qid=1411330952&sr=8-2&keywords=vita

What I recommend for working with webkit:
NotePad++
VMWare or equivalent running Ubuntu 11.04

Some Useful Links:

https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/

http://www.fireeye.com/blog/technical/cyber-exploits/2013/10/aslr-bypass-apocalypse-in-lately-zero-day-exploits.html

Some very useful links:

https://bugs.webkit.org/

http://www.exploit-db.com/

https://cve.mitre.org/index.html

What you are expected to know:
Have a decent understanding of c++ syntax
Have a decent understanding of modern exploit mitigation techniques (DEP, ASLR, etc)
Have a strong understanding of computer science and security in general

So in summary, the vita exploiting workflow is not all that much more complicated than the PSP exploiting workflow, except instead of trying lots of PSP games for crashes, you are trying lots of HTML files.
A release is imminent with an HTML file capable of dumping the Webkit process memory
A release is coming within the next months capable of running unsigned code through ROP chain

Future steps include a compiler to ROP, allowing any ordinary developer compile code for the native vita. Thats right, some day quite soon, anyone will be able to compile a hello world for the native vita.

Happy Hacking!
CodeLion

For the end user this means that there’s a few things that need to be done to get homebrews working: a ROP compiler, an SDK and enough homebrew developers interested in coding homebrews that take advantage of what the exploit has to offer. Fortunately those things are easy to do (and we are in the process of doing it: we have people working on ROP and codestation and I are working on the SDK), except for the homebrew developers part.
But there’s one more thing to overcome: NID poisoning. But I will leave that for the next post.

http://wololo.net/2014/09/22/native-vita-hacking-whats-the-situation-so-far-part-2/Source : http://wololo.net/2014/09/22/native-vita-hacking-whats-the-situation-so-far-part-2/

4 comments

25
sep

Un exploit dans le navigateur ? Donc pas besoin d'utiliser la technique foireuse d'une faille sauvegarde dans un jeu disponible pendant 2 H sur le psn ? Donc exploit gratuit et accessible à tous ? Donc accès aux capacités vita ?
Ok je met pas à jour je vous aime les mecs :D

25
sep

Portrait de Alucard73

bonne nouvelle et grand pas pour le hack PS Vita, c'est clair que mieux vaut pas mettre à jours la ps vita en 3.20, l'exploit 3.18 risque de ne plus fonctionner par la même ocasion

3
oct

Yeah super nouvelle ^^ j'vien d'acheter ma Vita et surprise elle est en 3.18 ok j'fait pas de MAJ :)

12
oct

cool, enfin nous pourrons avoir des custom firmwares sur nos Vita, je ne croyais plus vraiment