Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-39333

Опубликовано: 13 окт. 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the --experimental-wasm-modules command line option.

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.

Отчет

The inclusion of nodejs:20/nodejs commenced with RHEL-9.3 GA through RHEA-2023:6529 (https://access.redhat.com/errata/RHEA-2023:6529), which inherently incorporates the fix for CVE-2023-39333. Hence, Nodejs-20, as shipped with Red Hat Enterprise Linux 9, is not affected by this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:16/nodejsFix deferred
Red Hat Enterprise Linux 9nodejsFix deferred
Red Hat Enterprise Linux 9nodejs:20/nodejsNot affected
Red Hat Software Collectionsrh-nodejs14-nodejsFix deferred
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:586918.10.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:720514.11.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:584918.10.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2244418nodejs: code injection via WebAssembly export names

EPSS

Процентиль: 24%
0.00078
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
10 месяцев назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
nvd
10 месяцев назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
debian
10 месяцев назад

Maliciously crafted export names in an imported WebAssembly module can ...

CVSS3: 5.3
github
10 месяцев назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
fstec
почти 2 года назад

Уязвимость модуля WebAssembly программной платформы Node.js, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 24%
0.00078
Низкий

5.3 Medium

CVSS3