vendor:
N/A
by:
Jahorto
8.8
CVSS
HIGH
Inline JavaScript Execution
94
CWE
Product Name: N/A
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: N/A
2020
Inline JavaScript Execution
A vulnerability exists in the String.prototype.localeCompare method of JavaScript, which can be exploited to execute arbitrary JavaScript code. This is possible due to the fact that the JavaScript version of the method does not update ImplicitCallFlags, allowing malicious code to be executed without touching the flag. The vulnerability can be exploited by overriding the toString method of the first parameter to the localeCompare method, which will execute the malicious code.
Mitigation:
Developers should ensure that the ImplicitCallFlags are updated when using the String.prototype.localeCompare method.