CVE-2020-24345

JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option
References
Link Resource
https://github.com/jerryscript-project/jerryscript/issues/3977 Exploit Issue Tracking Patch Third Party Advisory
https://github.com/jerryscript-project/jerryscript/issues/3977 Exploit Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jerryscript:jerryscript:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:14

Type Values Removed Values Added
References () https://github.com/jerryscript-project/jerryscript/issues/3977 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/jerryscript-project/jerryscript/issues/3977 - Exploit, Issue Tracking, Patch, Third Party Advisory

07 Nov 2023, 03:19

Type Values Removed Values Added
Summary ** DISPUTED ** JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option. JerryScript through 2.3.0 allows stack consumption via function a(){new new Proxy(a,{})}JSON.parse("[]",a). NOTE: the vendor states that the problem is the lack of the --stack-limit option

Information

Published : 2020-08-13 19:15

Updated : 2024-11-21 05:14


NVD link : CVE-2020-24345

Mitre link : CVE-2020-24345

CVE.ORG link : CVE-2020-24345


JSON object : View

Products Affected

jerryscript

  • jerryscript
CWE
CWE-787

Out-of-bounds Write