Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1mOGY5LXE1aGctOWM3cc4AAYYj
ChakraCore RCE Vulnerability
ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11799, CVE-2017-11800, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821.
Permalink: https://github.com/advisories/GHSA-f8f9-q5hg-9c7qJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1mOGY5LXE1aGctOWM3cc4AAYYj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 2 years ago
Updated: about 1 year ago
CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Identifiers: GHSA-f8f9-q5hg-9c7q, CVE-2017-11801
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-11801
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11801
- https://github.com/chakra-core/ChakraCore/pull/3917
- https://github.com/chakra-core/ChakraCore/commit/7b936e208e6a5f8dea84340760205d25c0efdf43
- https://web.archive.org/web/20210124110147/http://www.securityfocus.com/bid/101146
- https://github.com/advisories/GHSA-f8f9-q5hg-9c7q
Blast Radius: 1.0
Affected Packages
nuget:Microsoft.ChakraCore
Dependent packages: 1Dependent repositories: 0
Downloads: 986,646 total
Affected Version Ranges: < 1.7.3
Fixed in: 1.7.3
All affected versions: 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.6.0, 1.6.2, 1.7.0, 1.7.1, 1.7.2
All unaffected versions: 1.7.3, 1.7.4, 1.7.5, 1.7.6, 1.8.0, 1.8.1, 1.8.2, 1.8.3, 1.8.4, 1.8.5, 1.10.0, 1.10.1, 1.10.2, 1.11.0, 1.11.1, 1.11.2, 1.11.3, 1.11.4, 1.11.5, 1.11.6, 1.11.7, 1.11.8, 1.11.9, 1.11.10, 1.11.11, 1.11.12, 1.11.13, 1.11.14, 1.11.15, 1.11.16, 1.11.17, 1.11.18, 1.11.19, 1.11.20, 1.11.21, 1.11.22, 1.11.23, 1.11.24