Executive Summary

Informations
Name CVE-2024-43357 First vendor Publication 2024-08-15
Vendor Cve Last vendor Modification 2024-08-19

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

ECMA-262 is the language specification for the scripting language ECMAScript. A problem in the ECMAScript (JavaScript) specification of async generators, introduced by a May 2021 spec refactor, may lead to mis-implementation in a way that could present as a security vulnerability, such as type confusion and pointer dereference.

The internal async generator machinery calls regular promise resolver functions on IteratorResult (`{ done, value }`) objects that it creates, assuming that the IteratorResult objects will not be then-ables. Unfortunately, these IteratorResult objects inherit from `Object.prototype`, so these IteratorResult objects can be made then-able, triggering arbitrary behaviour, including re-entering the async generator machinery in a way that violates some internal invariants.

The ECMAScript specification is a living standard and the issue has been addressed at the time of this advisory's public disclosure. JavaScript engine implementors should refer to the latest specification and update their implementations to comply with the `AsyncGenerator` section.

## References

- https://github.com/tc39/ecma262/commit/1e24a286d0a327d08e1154926b3ee79820232727 - https://bugzilla.mozilla.org/show_bug.cgi?id=1901411 - https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq - https://bugs.webkit.org/show_bug.cgi?id=275407 - https://issues.chromium.org/issues/346692561 - https://www.cve.org/CVERecord?id=CVE-2024-7652

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43357

Sources (Detail)

https://bugs.webkit.org/show_bug.cgi?id=275407
https://bugzilla.mozilla.org/show_bug.cgi?id=1901411
https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq
https://github.com/tc39/ecma262/commit/1e24a286d0a327d08e1154926b3ee79820232727
https://github.com/tc39/ecma262/commit/4cb5a6980e20be76c648f113c4cc762342172df3
https://github.com/tc39/ecma262/pull/2413
https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r
https://issues.chromium.org/issues/346692561
https://tc39.es/ecma262/#sec-asyncgenerator-objects
https://www.cve.org/CVERecord?id=CVE-2024-7652
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2024-08-19 17:27:26
  • Multiple Updates
2024-08-16 21:27:32
  • First insertion