-
CVSS Score
-The vulnerability stems from two primary issues: 1) Type confusion in JavaScript array methods due to improper prototype chain handling, evidenced by patches adding missing checks in TemplatedGetItem/MapHelper and spread operations. 2) Memory corruption in JIT compiler due to missing buffer integrity checks, addressed by CRC validation. The commit diff shows critical modifications to these functions, and Microsoft's advisory explicitly lists affected Array.prototype methods (join, indexOf, map) that would utilize these vulnerable functions.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Microsoft.ChakraCore | nuget | < 1.2.1 | 1.2.1 |