Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vc9j-fhvv-8vrf

Опубликовано: 27 июл. 2020
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Remote Code Execution in scratch-vm

MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented.

NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts.

Пакеты

Наименование

scratch-vm

npm
Затронутые версииВерсия исправления

<= 0.2.0-prerelease.20200709173451

0.2.0-prerelease.20200714185213

EPSS

Процентиль: 91%
0.06601
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
больше 5 лет назад

MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented. NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts.

EPSS

Процентиль: 91%
0.06601
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502