CVE-2022-44789
8.8HIGH
Key Information
- Vendor
- Artifex
- Status
- Mujs
- Vendor
- CVE Published:
- 23 November 2022
Badges
👾 Exploit Exists🔴 Public PoC
Summary
A logical issue in O_getOwnPropertyDescriptor() in Artifex MuJS 1.0.0 through 1.3.x before 1.3.2 allows an attacker to achieve Remote Code Execution through memory corruption, via the loading of a crafted JavaScript file.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Refferences
https://github.com/ccxvii/mujs/commit/edb50ad66f7601ca9a3...
https://github.com/alalng/CVE-2022-44789/blob/main/Public...
https://github.com/ccxvii/mujs/releases/tag/1.3.2
https://www.debian.org/security/2022/dsa-5291
vendor-advisory
https://lists.fedoraproject.org/archives/list/package-ann...
vendor-advisory
EPSS Score
1% chance of being exploited in the next 30 days.
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
- 🔴
Public PoC available
- 👾
Exploit known to exist
Vulnerability Reserved
Collectors
NVD DatabaseMitre Database1 Proof of Concept(s)