Lucene search

K
cveHackeroneCVE-2023-39333
HistorySep 07, 2024 - 4:15 p.m.

CVE-2023-39333

2024-09-0716:15:02
CWE-94
hackerone
web.nvd.nist.gov
92
cve-2023-39333 organization individual nvd

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

9.5%

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.

This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the --experimental-wasm-modules command line option.

Affected configurations

Vulners
Vulnrichment
Node
node.jsnode.jsRange20.8.0
OR
node.jsnode.jsRange18.18.1
VendorProductVersionCPE
node.jsnode.js*cpe:2.3:a:node.js:node.js:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "vendor": "Node.js",
    "product": "Node.js",
    "versions": [
      {
        "version": "20.8.0",
        "status": "affected",
        "lessThanOrEqual": "20.8.0",
        "versionType": "semver"
      },
      {
        "version": "18.18.1",
        "status": "affected",
        "lessThanOrEqual": "18.18.1",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

6.7

Confidence

Low

EPSS

0

Percentile

9.5%