Miggo Logo

CVE-2020-0970: ChakraCore Remote Code Execution Vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.97056%
Published
5/24/2022
Updated
7/17/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
Microsoft.ChakraCorenuget< 1.11.181.11.18

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper memory handling in ChakraCore's PathTypeHandler. The patch adds a critical check to ClearSingletonInstanceIfSame() in GrowHandlerToBiggerSize, indicating the original code failed to clear singleton instances when modifying type paths. This omission could leave dangling pointers or invalid memory references, enabling memory corruption via out-of-bounds writes (CWE-787). The direct association between the patched code and the CWE, along with the commit's explicit CVE reference, confirms this function's role in the vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r*mot* *o** *x**ution vuln*r**ility *xists in t** w*y t**t t** ***kr**or* s*riptin* *n*in* **n*l*s o*j**ts in m*mory, *k* 'S*riptin* *n*in* M*mory *orruption Vuln*r**ility'. T*is *V* I* is uniqu* *rom *V*-****-****.

Reasoning

T** vuln*r**ility st*ms *rom improp*r m*mory **n*lin* in ***kr**or*'s P*t*Typ***n*l*r. T** p*t** ***s * *riti**l ****k to `*l**rSin*l*tonInst*n**I*S*m*()` in `*row**n*l*rTo*i***rSiz*`, in*i**tin* t** ori*in*l *o** **il** to *l**r sin*l*ton inst*n**s