Miggo Logo

CVE-2019-1051: ChakraCore RCE via Out-of-bounds write

7.5

CVSS Score
3.0

Basic Information

EPSS Score
0.90754%
Published
5/24/2022
Updated
8/1/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
Microsoft.ChakraCorenuget< 1.11.101.11.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of array types and value tracking during JIT optimization. The commits show critical fixes in ProcessDef (tracking numeric preservation) and KillLiveElems (array type safety during stores). These functions in vulnerable versions lacked proper checks, enabling type confusion and memory corruption via OOB writes.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r*mot* *o** *x**ution vuln*r**ility *xists in t** w*y t**t t** ***kr* s*riptin* *n*in* **n*l*s o*j**ts in m*mory in Mi*roso*t ****, *k* '***kr* S*riptin* *n*in* M*mory *orruption Vuln*r**ility'. T*is *V* I* is uniqu* *rom *V*-****-****, *V*-****-**

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* *rr*y typ*s *n* v*lu* tr**kin* *urin* JIT optimiz*tion. T** *ommits s*ow *riti**l *ix*s in `Pro**ss***` (tr**kin* num*ri* pr*s*rv*tion) *n* `KillLiv**l*ms` (*rr*y typ* s***ty *urin* stor*s). T**s* *un