vendor:
Chakra
by:
Project Zero
8,8
CVSS
HIGH
Array Join Vulnerability
20
CWE
Product Name: Chakra
Affected Version From: Chakra versions prior to the latest version
Affected Version To: Chakra versions prior to the latest version
Patch Exists: YES
Related CWE: None
CPE: Chakra
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2017
Chakra Array Join Vulnerability
When an array is joined in Chakra, it calls JavascriptArray::JoinArrayHelper, a function that is templated based on the type of the array. This function then calls JavascriptArray::TemplatedGetItem to get each item in the array. If an element is missing from the array, this function will fall back to the array object's prototype, which could contain a getter or a proxy, allowing user script to be executed. This script can have side effects, including changing the type of the array, however JoinArrayHelper will continue running as it's templated type even if this has happened. This can allow object pointers in an array to be read as integers and accessed by a malicious script.
Mitigation:
Upgrade to the latest version of Chakra to patch the vulnerability.