CVE-2016-7190: ChakraCore RCE Vulnerability
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98964%
CWE
Published
5/14/2022
Updated
11/2/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Microsoft.ChakraCore | nuget | <= 1.2.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from: (1) Type confusion in JavascriptArray
methods (join
/indexOf
/lastIndexOf
/apply
/map
) due to unsafe TemplatedGetItem
optimizations when prototype chain modifications occur, (2) Missing buffer integrity checks in encoder
allowing RWX memory tampering, (3) Use-after-free in optimization passes (GlobOpt
) and lowering logic (LowerMDShared
). The patch directly modifies these functions to add CRC
validation, prototype access checks, and lifetime management fixes, aligning with CWE-119
's memory corruption context. Test cases explicitly target array prototype manipulation scenarios that would trigger these vulnerabilities.