First published: Tue Oct 11 2022(Updated: )
A write-what-where condition in hermes caused by an integer overflow, prior to commit 5b6255ae049fa4641791e47fad994e8e8c4da374 allows attackers to potentially execute arbitrary code via crafted JavaScript. Note that this is only exploitable if the application using Hermes permits evaluation of untrusted JavaScript. Hence, most React Native applications are not affected.
Credit: cve-assign@fb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Facebook Hermes | <0.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35289 is a vulnerability in Hermes, a JavaScript engine developed by Facebook, that allows attackers to potentially execute arbitrary code via crafted JavaScript.
The severity of CVE-2022-35289 is critical, with a CVSS score of 9.8.
Hermes versions up to and excluding 0.12.0 are affected by CVE-2022-35289.
To fix CVE-2022-35289, it is recommended to update Hermes to a version beyond 0.12.0, which includes the fix for the vulnerability.
You can find more information about CVE-2022-35289 in the official Facebook Security Advisories and the GitHub commit linked in the references.