A bytecode optimization bug in Hermes prior to commit e6ed9c1a4b02dc219de1648f44cd808a56171b81 could be used to cause an use-after-free and obtain arbitrary code execution via a carefully crafted payload. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
References
Link | Resource |
---|---|
https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81 | Patch |
https://www.facebook.com/security/advisories/cve-2023-28081 | Patch Vendor Advisory |
Configurations
History
26 May 2023, 18:26
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.facebook.com/security/advisories/cve-2023-28081 - Patch, Vendor Advisory | |
References | (MISC) https://github.com/facebook/hermes/commit/e6ed9c1a4b02dc219de1648f44cd808a56171b81 - Patch | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Facebook
Facebook hermes |
|
CPE | cpe:2.3:a:facebook:hermes:-:*:*:*:*:*:*:* |
Information
Published : 2023-05-18 22:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-28081
Mitre link : CVE-2023-28081
CVE.ORG link : CVE-2023-28081
JSON object : View
Products Affected
- hermes
CWE
CWE-416
Use After Free