
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-38999 affects jrburke requirejs version 2.3.6, which contains a prototype pollution vulnerability in the s.contexts._.configure function. This vulnerability was discovered and disclosed on July 1, 2024, and affects systems using the specified version of the RequireJS library (NVD).
The vulnerability exists in the s.contexts._.configure function of RequireJS v2.3.6, allowing attackers to perform prototype pollution attacks. The CVSS v3.1 base score is 10.0 (CRITICAL) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. The vulnerability is classified as CWE-1321 (Improperly Controlled Modification of Object Prototype Attributes) (NVD).
The vulnerability enables attackers to execute arbitrary code or cause a Denial of Service (DoS) by injecting arbitrary properties through prototype pollution. This can lead to significant security implications as it allows manipulation of object properties across the application (NVD).
The vulnerability has been fixed in version 2.3.7. Organizations using affected versions should upgrade to the patched version. Oracle has noted this vulnerability in their Critical Patch Updates and has implemented fixes or mitigations in their products that use RequireJS (Oracle Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."