CVE-2018-8133: ChakraCore RCE Vulnerability
7.5
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.98587%
CWE
Published
5/13/2022
Updated
10/6/2023
KEV Status
No
Technology
C#
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Microsoft.ChakraCore | nuget | < 1.8.4 | 1.8.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) MarshalDynamicObjectAndPrototype's failure to special-case Proxy objects allowed execution of user-defined getPrototypeOf handlers during marshaling. 2) EntrySimpleObjectSlotGetter's implementation lacked reentrancy guards (JS_REENTRANCY_LOCK) when calling these marshaling functions. The patch adds both Proxy-specific handling and reentrancy protection, confirming these were the vulnerable paths. The PoC demonstrates how manipulating Proxy handlers during marshaling could alter array types, leading to type confusion.