{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T13:22:56.112","vulnerabilities":[{"cve":{"id":"CVE-2024-43357","sourceIdentifier":"security-advisories@github.com","published":"2024-08-15T19:15:20.107","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"ECMA-262 is the language specification for the scripting language ECMAScript. A problem in the ECMAScript (JavaScript) specification of async generators, introduced by a May 2021 spec refactor, may lead to mis-implementation in a way that could present as a security vulnerability, such as type confusion and pointer dereference.\n\nThe internal async generator machinery calls regular promise resolver functions on IteratorResult (`{ done, value }`) objects that it creates, assuming that the IteratorResult objects will not be then-ables. Unfortunately, these IteratorResult objects inherit from `Object.prototype`, so these IteratorResult objects can be made then-able, triggering arbitrary behaviour, including re-entering the async generator machinery in a way that violates some internal invariants.\n\nThe ECMAScript specification is a living standard and the issue has been addressed at the time of this advisory's public disclosure. JavaScript engine implementors should refer to the latest specification and update their implementations to comply with the `AsyncGenerator` section.\n\n## References\n\n- https://github.com/tc39/ecma262/commit/1e24a286d0a327d08e1154926b3ee79820232727\n- https://bugzilla.mozilla.org/show_bug.cgi?id=1901411\n- https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq\n- https://bugs.webkit.org/show_bug.cgi?id=275407\n- https://issues.chromium.org/issues/346692561\n- https://www.cve.org/CVERecord?id=CVE-2024-7652"},{"lang":"es","value":"ECMA-262 es la especificación del lenguaje para el lenguaje de scripting ECMAScript. Un problema en la especificación ECMAScript (JavaScript) de los generadores asíncronos, introducido por una refactorización de especificaciones de mayo de 2021, puede provocar una implementación incorrecta de una manera que podría presentarse como una vulnerabilidad de seguridad, como confusión de tipos y desreferencia de puntero. La maquinaria interna del generador asíncrono llama a funciones regulares de resolución de promesas en los objetos IteratorResult (`{ done, value }`) que crea, asumiendo que los objetos IteratorResult no serán habilitables en ese momento. Desafortunadamente, estos objetos IteratorResult heredan de `Object.prototype`, por lo que estos objetos IteratorResult pueden volverse compatibles, lo que desencadena un comportamiento arbitrario, incluido el reingreso a la maquinaria del generador asíncrono de una manera que viola algunas invariantes internas. La especificación ECMAScript es un estándar de vida y el problema se ha abordado en el momento de la divulgación pública de este aviso. Los implementadores del motor JavaScript deben consultar la especificación más reciente y actualizar sus implementaciones para cumplir con la sección \"AsyncGenerator\". ## Referencias: https://github.com/tc39/ecma262/commit/1e24a286d0a327d08e1154926b3ee79820232727 - https://bugzilla.mozilla.org/show_bug.cgi?id=1901411 - https://github.com/boa-dev/ boa/security/advisories/GHSA-f67q-wr6w-23jq - https://bugs.webkit.org/show_bug.cgi?id=275407 - https://issues.chromium.org/issues/346692561 - https:// www.cve.org/CVERecord?id=CVE-2024-7652"}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":4.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-248"},{"lang":"en","value":"CWE-476"},{"lang":"en","value":"CWE-843"}]}],"references":[{"url":"https://bugs.webkit.org/show_bug.cgi?id=275407","source":"security-advisories@github.com"},{"url":"https://bugzilla.mozilla.org/show_bug.cgi?id=1901411","source":"security-advisories@github.com"},{"url":"https://github.com/boa-dev/boa/security/advisories/GHSA-f67q-wr6w-23jq","source":"security-advisories@github.com"},{"url":"https://github.com/tc39/ecma262/commit/1e24a286d0a327d08e1154926b3ee79820232727","source":"security-advisories@github.com"},{"url":"https://github.com/tc39/ecma262/commit/4cb5a6980e20be76c648f113c4cc762342172df3","source":"security-advisories@github.com"},{"url":"https://github.com/tc39/ecma262/pull/2413","source":"security-advisories@github.com"},{"url":"https://github.com/tc39/ecma262/security/advisories/GHSA-g38c-wh3c-5h9r","source":"security-advisories@github.com"},{"url":"https://issues.chromium.org/issues/346692561","source":"security-advisories@github.com"},{"url":"https://tc39.es/ecma262/#sec-asyncgenerator-objects","source":"security-advisories@github.com"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-7652","source":"security-advisories@github.com"}]}}]}