CVE-2024-43367 (GCVE-0-2024-43367)

Vulnerability from cvelistv5 – Published: 2024-08-15 20:38 – Updated: 2024-08-20 15:45
VLAI?
Title
Boa has an uncaught exception when transitioning the state of `AsyncGenerator` objects
Summary
Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript's `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa's implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise's `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don't impact the availability of the main application.
CWE
Assigner
Impacted products
Vendor Product Version
boa-dev boa Affected: >= 0.16, < 0.19.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:boa:boa:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "boa",
            "vendor": "boa",
            "versions": [
              {
                "lessThanOrEqual": "0.16",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "0.19.0",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-43367",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-20T15:42:47.405347Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-20T15:45:24.595Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "boa",
          "vendor": "boa-dev",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 0.16, \u003c 0.19.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript\u0027s `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa\u0027s implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise\u0027s `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don\u0027t impact the availability of the main application."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-248",
              "description": "CWE-248: Uncaught Exception",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-15T20:38:23.530Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq"
        },
        {
          "name": "https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r"
        },
        {
          "name": "https://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7"
        }
      ],
      "source": {
        "advisory": "GHSA-f67q-wr6w-23jq",
        "discovery": "UNKNOWN"
      },
      "title": "Boa has an uncaught exception when transitioning the state of `AsyncGenerator` objects"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2024-43367",
    "datePublished": "2024-08-15T20:38:23.530Z",
    "dateReserved": "2024-08-09T14:23:55.513Z",
    "dateUpdated": "2024-08-20T15:45:24.595Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript\u0027s `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa\u0027s implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise\u0027s `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don\u0027t impact the availability of the main application.\"}, {\"lang\": \"es\", \"value\": \"Boa es un motor Javascript integrable y experimental escrito en Rust. A partir de la versi\\u00f3n 0.16 y antes de la versi\\u00f3n 0.19.0, una suposici\\u00f3n incorrecta al manejar las operaciones `AsyncGenerator` de ECMAScript puede causar una excepci\\u00f3n no detectada en ciertos scripts. La implementaci\\u00f3n de Boa de `AsyncGenerator` supone que el estado de un objeto `AsyncGenerator` no puede cambiar mientras se resuelve una promesa creada por m\\u00e9todos de `AsyncGenerator` como `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, o `%AsyncGeneratorPrototype%.throw`. Sin embargo, un c\\u00f3digo cuidadosamente construido podr\\u00eda desencadenar una transici\\u00f3n de estado desde un m\\u00e9todo getter para la propiedad \\\"then\\\" de la promesa, lo que hace que el motor falle en la afirmaci\\u00f3n de esta suposici\\u00f3n, provocando una excepci\\u00f3n no detectada. Esto podr\\u00eda usarse para crear un ataque de denegaci\\u00f3n de servicio en aplicaciones que ejecutan c\\u00f3digo ECMAScript arbitrario proporcionado por un usuario externo. La versi\\u00f3n 0.19.0 tiene un parche para manejar correctamente este caso. Los usuarios que no puedan actualizar a la versi\\u00f3n parcheada querr\\u00e1n usar `std::panic::catch_unwind` para garantizar que las excepciones causadas por el motor no afecten la disponibilidad de la aplicaci\\u00f3n principal.\"}]",
      "id": "CVE-2024-43367",
      "lastModified": "2024-08-19T13:00:23.117",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
      "published": "2024-08-15T21:15:17.777",
      "references": "[{\"url\": \"https://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r\", \"source\": \"security-advisories@github.com\"}]",
      "sourceIdentifier": "security-advisories@github.com",
      "vulnStatus": "Awaiting Analysis",
      "weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-248\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-43367\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2024-08-15T21:15:17.777\",\"lastModified\":\"2024-08-19T13:00:23.117\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript\u0027s `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa\u0027s implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise\u0027s `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don\u0027t impact the availability of the main application.\"},{\"lang\":\"es\",\"value\":\"Boa es un motor Javascript integrable y experimental escrito en Rust. A partir de la versi\u00f3n 0.16 y antes de la versi\u00f3n 0.19.0, una suposici\u00f3n incorrecta al manejar las operaciones `AsyncGenerator` de ECMAScript puede causar una excepci\u00f3n no detectada en ciertos scripts. La implementaci\u00f3n de Boa de `AsyncGenerator` supone que el estado de un objeto `AsyncGenerator` no puede cambiar mientras se resuelve una promesa creada por m\u00e9todos de `AsyncGenerator` como `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, o `%AsyncGeneratorPrototype%.throw`. Sin embargo, un c\u00f3digo cuidadosamente construido podr\u00eda desencadenar una transici\u00f3n de estado desde un m\u00e9todo getter para la propiedad \\\"then\\\" de la promesa, lo que hace que el motor falle en la afirmaci\u00f3n de esta suposici\u00f3n, provocando una excepci\u00f3n no detectada. Esto podr\u00eda usarse para crear un ataque de denegaci\u00f3n de servicio en aplicaciones que ejecutan c\u00f3digo ECMAScript arbitrario proporcionado por un usuario externo. La versi\u00f3n 0.19.0 tiene un parche para manejar correctamente este caso. Los usuarios que no puedan actualizar a la versi\u00f3n parcheada querr\u00e1n usar `std::panic::catch_unwind` para garantizar que las excepciones causadas por el motor no afecten la disponibilidad de la aplicaci\u00f3n principal.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-248\"}]}],\"references\":[{\"url\":\"https://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r\",\"source\":\"security-advisories@github.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"title\": \"Boa has an uncaught exception when transitioning the state of `AsyncGenerator` objects\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-248\", \"lang\": \"en\", \"description\": \"CWE-248: Uncaught Exception\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"HIGH\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq\"}, {\"name\": \"https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r\"}, {\"name\": \"https://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/boa-dev/boa/commit/69ea2f52ed976934bff588d6b566bae01be313f7\"}], \"affected\": [{\"vendor\": \"boa-dev\", \"product\": \"boa\", \"versions\": [{\"version\": \"\u003e= 0.16, \u003c 0.19.0\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2024-08-15T20:38:23.530Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Boa is an embeddable and experimental Javascript engine written in Rust. Starting in version 0.16 and prior to version 0.19.0, a wrong assumption made when handling ECMAScript\u0027s `AsyncGenerator` operations can cause an uncaught exception on certain scripts. Boa\u0027s implementation of `AsyncGenerator` makes the assumption that the state of an `AsyncGenerator` object cannot change while resolving a promise created by methods of `AsyncGenerator` such as `%AsyncGeneratorPrototype%.next`, `%AsyncGeneratorPrototype%.return`, or `%AsyncGeneratorPrototype%.throw`. However, a carefully constructed code could trigger a state transition from a getter method for the promise\u0027s `then` property, which causes the engine to fail an assertion of this assumption, causing an uncaught exception. This could be used to create a Denial Of Service attack in applications that run arbitrary ECMAScript code provided by an external user. Version 0.19.0 is patched to correctly handle this case. Users unable to upgrade to the patched version would want to use `std::panic::catch_unwind` to ensure any exceptions caused by the engine don\u0027t impact the availability of the main application.\"}], \"source\": {\"advisory\": \"GHSA-f67q-wr6w-23jq\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-43367\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-20T15:42:47.405347Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:boa:boa:*:*:*:*:*:*:*:*\"], \"vendor\": \"boa\", \"product\": \"boa\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"0.16\"}, {\"status\": \"affected\", \"version\": \"0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"0.19.0\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-20T15:45:18.006Z\"}}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-43367\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2024-08-09T14:23:55.513Z\", \"datePublished\": \"2024-08-15T20:38:23.530Z\", \"dateUpdated\": \"2024-08-20T15:45:24.595Z\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…