8.8
CVSSv3

CVE-2023-45133

Published: 12/10/2023 Updated: 24/10/2023
CVSS v3 Base Score: 8.8 | Impact Score: 6 | Exploitability Score: 2
VMScore: 0

Vulnerability Summary

Babel is a compiler for writingJavaScript. In `@babel/traverse` prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods. Known affected plugins are `@babel/plugin-transform-runtime`; `@babel/preset-env` when using its `useBuiltIns` option; and any "polyfill provider" plugin that depends on `@babel/helper-define-polyfill-provider`, such as `babel-plugin-polyfill-corejs3`, `babel-plugin-polyfill-corejs2`, `babel-plugin-polyfill-es-shims`, `babel-plugin-polyfill-regenerator`. No other plugins under the `@babel/` namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in `@babel/traverse@7.23.2` and `@babel/traverse@8.0.0-alpha.4`. Those who cannot upgrade `@babel/traverse` and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected `@babel/traverse` versions: `@babel/plugin-transform-runtime` v7.23.2, `@babel/preset-env` v7.23.2, `@babel/helper-define-polyfill-provider` v0.4.3, `babel-plugin-polyfill-corejs2` v0.4.6, `babel-plugin-polyfill-corejs3` v0.8.5, `babel-plugin-polyfill-es-shims` v0.10.0, `babel-plugin-polyfill-regenerator` v0.5.3.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

debian debian linux 10.0

debian debian linux 11.0

debian debian linux 12.0

babeljs babel 8.0.0

babeljs babel

babeljs babel-plugin-polyfill-regenerator

babeljs babel-plugin-polyfill-es-shims

babeljs babel-plugin-polyfill-corejs3

babeljs babel-plugin-polyfill-corejs2

babeljs babel-helper-define-polyfill-provider

babeljs babel-preset-env

babeljs babel-plugin-transform-runtime

Vendor Advisories

Debian Bug report logs - #1053880 node-babel7: CVE-2023-45133 Package: src:node-babel7; Maintainer for src:node-babel7 is Debian Javascript Maintainers <pkg-javascript-devel@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Fri, 13 Oct 2023 13:27:09 UTC Severity: grave Tags: security F ...
William Khem-Marquez discovered that using malicious plugins for the the Babel JavaScript compiler could result in arbitrary code execution during compilation For the oldstable distribution (bullseye), this problem has been fixed in version 71212+~cs15014184-6+deb11u1 For the stable distribution (bookworm), this problem has been fixed in versi ...

Github Repositories

undefined

@babel/traverse@< 7232 Issue Research repo Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code · CVE-2023-45133 · GitHub Advisory Database githubcom/babel/babel-polyfills/commit/e9f0aa83683e1eaa8b6401c4aadb232c86a85c76 npmfscom/compare/@babel/helper-define-polyfill-provider/043/042/

Documentação do código de vulnerabilidade do Babel

Babel-vulner-vel-a-execucao-arbitraria-de-codigo-ao-compilar-codigo-malicioso-especificamente-criado Documentação do código de vulnerabilidade do Babel Vulnerabilidade CVE-2023-45133 no Babel A vulnerabilidade CVE-2023-45133 é uma vulnerabilidade de execução arbitrária (RCE) no Babel, um compilador JavaScript A vulnerabilidade p