Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r6xg-3mr4-3226

Опубликовано: 29 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

A type confusion in jsish 2.0 allows incorrect control flow during execution of the OP_NEXT opcode. When an “instanceof” expression uses an array element access as the left-hand operand inside a for-in loop, the instructions implementation leaves an additional array reference on the stack rather than consuming it during OP_INSTANCEOF. As a result, OP_NEXT interprets the array as an iterator object and reads the iterCmd function pointer from an invalid structure, potentially causing a crash or enabling code execution depending on heap layout.

A type confusion in jsish 2.0 allows incorrect control flow during execution of the OP_NEXT opcode. When an “instanceof” expression uses an array element access as the left-hand operand inside a for-in loop, the instructions implementation leaves an additional array reference on the stack rather than consuming it during OP_INSTANCEOF. As a result, OP_NEXT interprets the array as an iterator object and reads the iterCmd function pointer from an invalid structure, potentially causing a crash or enabling code execution depending on heap layout.

EPSS

Процентиль: 27%
0.00094
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-843

Связанные уязвимости

CVSS3: 9.8
nvd
около 1 месяца назад

A type confusion in jsish 2.0 allows incorrect control flow during execution of the OP_NEXT opcode. When an “instanceof” expression uses an array element access as the left-hand operand inside a for-in loop, the instructions implementation leaves an additional array reference on the stack rather than consuming it during OP_INSTANCEOF. As a result, OP_NEXT interprets the array as an iterator object and reads the iterCmd function pointer from an invalid structure, potentially causing a crash or enabling code execution depending on heap layout.

EPSS

Процентиль: 27%
0.00094
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-843