First published: Mon Jul 01 2024(Updated: )
jrburke requirejs could allow a remote attacker to execute arbitrary code on the system, caused by a prototype pollution in the function s.contexts._.configure. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
npm/requirejs | <=2.3.6 | 2.3.7 |
IBM Cognos Analytics | <=12.0.0-12.0.4 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38999 is considered a high severity vulnerability due to its potential for remote code execution.
To fix CVE-2024-38999, upgrade requirejs to version 2.3.7 or later.
CVE-2024-38999 affects requirejs version 2.3.6 and earlier, as well as IBM Planning Analytics versions up to 2.1.
CVE-2024-38999 is a prototype pollution vulnerability that allows for arbitrary code execution.
Yes, CVE-2024-38999 can be exploited to cause denial of service as well as execute arbitrary code.