Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-43357
HistoryAug 15, 2024 - 6:36 p.m.

CVE-2024-43357 JavaScript specification issue may lead to type confusion and pointer dereference in implementations

2024-08-1518:36:49
CWE-248
CWE-476
CWE-843
GitHub_M
github.com
6
ecmascript
async generators
specification
security vulnerability
javascript engine
iteratorresult
then-ables
pointer dereference
type confusion
living standard.

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

8.4

Confidence

High

EPSS

0

Percentile

13.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

ECMA-262 is the language specification for the scripting language ECMAScript. A problem in the ECMAScript (JavaScript) specification of async generators, introduced by a May 2021 spec refactor, may lead to mis-implementation in a way that could present as a security vulnerability, such as type confusion and pointer dereference.

The internal async generator machinery calls regular promise resolver functions on IteratorResult ({ done, value }) objects that it creates, assuming that the IteratorResult objects will not be then-ables. Unfortunately, these IteratorResult objects inherit from Object.prototype, so these IteratorResult objects can be made then-able, triggering arbitrary behaviour, including re-entering the async generator machinery in a way that violates some internal invariants.

The ECMAScript specification is a living standard and the issue has been addressed at the time of this advisory’s public disclosure. JavaScript engine implementors should refer to the latest specification and update their implementations to comply with the AsyncGenerator section.

References

CNA Affected

[
  {
    "vendor": "tc39",
    "product": "ecma262",
    "versions": [
      {
        "version": ">= 2022, < 2025",
        "status": "affected"
      }
    ]
  }
]

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:ecma_international:ecma262:*:*:*:*:*:*:*:*"
    ],
    "vendor": "ecma_international",
    "product": "ecma262",
    "versions": [
      {
        "status": "affected",
        "version": "2022",
        "lessThan": "2025",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

AI Score

8.4

Confidence

High

EPSS

0

Percentile

13.7%

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial