First published: Mon Oct 16 2023(Updated: )
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. References: <a href="https://nodejs.org/en/blog/vulnerability/october-2023-security-releases">https://nodejs.org/en/blog/vulnerability/october-2023-security-releases</a>
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cognos Analytics | <=12.0.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39333 has been classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2023-39333, apply the available patches provided by IBM for affected versions of Cognos Analytics.
CVE-2023-39333 affects IBM Cognos Analytics versions up to 12.0.2 and 11.2.4 FP3.
CVE-2023-39333 allows maliciously crafted WebAssembly exports to inject JavaScript code into the application.
Yes, CVE-2023-39333 could potentially lead to data breaches by allowing unauthorized access to sensitive data and functions.