A use-after-free related to unsound inference in the bytecode generation when optimizations are enabled for Hermes prior to commit da8990f737ebb9d9810633502f65ed462b819c09 could have been used by an attacker to achieve remote code execution. Note that this is only exploitable in cases where Hermes is used to execute untrusted JavaScript. Hence, most React Native applications are not affected.
References
Link | Resource |
---|---|
https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09 | Patch |
https://www.facebook.com/security/advisories/cve-2023-30470 | Patch Vendor Advisory |
Configurations
History
26 May 2023, 18:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:facebook:hermes:-:*:*:*:*:*:*:* | |
First Time |
Facebook
Facebook hermes |
|
References | (MISC) https://github.com/facebook/hermes/commit/da8990f737ebb9d9810633502f65ed462b819c09 - Patch | |
References | (MISC) https://www.facebook.com/security/advisories/cve-2023-30470 - Patch, Vendor Advisory | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Information
Published : 2023-05-18 22:15
Updated : 2024-02-28 20:13
NVD link : CVE-2023-30470
Mitre link : CVE-2023-30470
CVE.ORG link : CVE-2023-30470
JSON object : View
Products Affected
- hermes
CWE
CWE-416
Use After Free