First published: Mon Oct 16 2023(Updated: )
Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module. References: <a href="https://nodejs.org/en/blog/vulnerability/october-2023-security-releases">https://nodejs.org/en/blog/vulnerability/october-2023-security-releases</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Node.js |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2244418 is critical due to its potential to allow arbitrary JavaScript code injection.
To fix REDHAT-BUG-2244418, you should update Node.js to the latest security release that addresses this vulnerability.
Failing to address REDHAT-BUG-2244418 may lead to unauthorized access to sensitive data and functions in your application.
Developers using vulnerable versions of Node.js that import WebAssembly modules are primarily affected by REDHAT-BUG-2244418.
Currently, the best approach for REDHAT-BUG-2244418 is to apply the security update, as no official workaround has been recommended.