vendor:
ChakraCore
by:
Project Zero
8,8
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: ChakraCore
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: Yes
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2017
JavaScript Spread Operator Vulnerability
The spread operator in JavaScript allows an array to be treated as function parameters using the syntax 'f(...a)'. When DirectGetItemAtFull accesses the array, if an element of the array is undefined, it will fall back to the prototype of the array. In some situations, for example if the prototype is a Proxy, this can execute user-defined script, which can change the length of the array, meaning that the call can overflow destArgs.Values, even through the length has already been checked.
Mitigation:
Ensure that the length of the array is not changed after it has been checked.