Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-36120
HistoryMay 31, 2024 - 4:29 p.m.

CVE-2024-36120 javascript-deobfuscator crafted payload can lead to code execution

2024-05-3116:29:14
CWE-94
GitHub_M
www.cve.org
cve-2024-36120
javascript-deobfuscator
crafted payload
code execution
version 1.1.0
expression simplification
patch
upgrade
disable

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.2%

javascript-deobfuscator removes common JavaScript obfuscation techniques. In affected versions crafted payloads targeting expression simplification can lead to code execution. This issue has been patched in version 1.1.0. Users are advised to update. Users unable to upgrade should disable the expression simplification feature.

CNA Affected

[
  {
    "vendor": "ben-sb",
    "product": "javascript-deobfuscator",
    "versions": [
      {
        "version": "< 1.1.0",
        "status": "affected"
      }
    ]
  }
]

8.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.2%

Related for CVELIST:CVE-2024-36120