CVE-2016-7240: ChakraCore RCE Vulnerability
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99254%
CWE
Published
5/14/2022
Updated
11/1/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Microsoft.ChakraCore | nuget | < 1.2.2 | 1.2.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows critical safety checks being added to: 1) eval
's CallFlags handling (GlobalObject.cpp
), 2) Array
prototype methods (JavascriptArray.cpp
) adding native array conversions, 3) JSON
parser array handling, and 4) ArraySpeciesCreate
species validation. These directly correlate to the CWE-119 memory corruption described, with test cases demonstrating type confusion scenarios in filter/splice/eval
operations. The patch patterns (EnsureNonNativeArray
, CheckAndConvertCopyOnAccess
, isDirectEvalCall
) indicate these were the vulnerable entry points.