Use of Externally-Controlled Format String Affecting rquickjs package, versions <0.4.2


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use of Externally-Controlled Format String vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-RQUICKJS-6305271
  • published29 Feb 2024
  • disclosed21 Feb 2024
  • creditUnknown

Introduced: 21 Feb 2024

CVE NOT AVAILABLE CWE-134  (opens in a new tab)

How to fix?

Upgrade rquickjs to version 0.4.2 or higher.

Overview

rquickjs is a set of high level bindings to the QuickJS JavaScript engine

Affected versions of this package are vulnerable to Use of Externally-Controlled Format String in exception.rs, which passes user input into an executable string. A privileged user can exploit this to read arbitrary memory from the remote process or execute code.

CVSS Scores

version 3.1