Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-39333

Опубликовано: 13 окт. 2023
Источник: redhat
CVSS3: 5.3

Описание

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the --experimental-wasm-modules command line option.

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.

Отчет

The inclusion of nodejs:20/nodejs commenced with RHEL-9.3 GA through RHEA-2023:6529 (https://access.redhat.com/errata/RHEA-2023:6529), which inherently incorporates the fix for CVE-2023-39333. Hence, Nodejs-20, as shipped with Red Hat Enterprise Linux 9, is not affected by this vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8nodejs:16/nodejsFix deferred
Red Hat Enterprise Linux 9nodejsFix deferred
Red Hat Enterprise Linux 9nodejs:20/nodejsNot affected
Red Hat Software Collectionsrh-nodejs14-nodejsFix deferred
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:586918.10.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:720514.11.2023
Red Hat Enterprise Linux 9nodejsFixedRHSA-2023:584918.10.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2244418nodejs: code injection via WebAssembly export names

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
11 месяцев назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
nvd
11 месяцев назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
debian
11 месяцев назад

Maliciously crafted export names in an imported WebAssembly module can ...

CVSS3: 5.3
github
11 месяцев назад

Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. This vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.

CVSS3: 5.3
fstec
около 2 лет назад

Уязвимость модуля WebAssembly программной платформы Node.js, позволяющая нарушителю выполнить произвольные команды

5.3 Medium

CVSS3