Description
MIT Lifelong Kindergarten Scratch scratch-vm before 0.2.0-prerelease.20200714185213 loads extension URLs from untrusted project.json files with certain _ characters, resulting in remote code execution because the URL's content is treated as a script and is executed as a worker. The responsible code is getExtensionIdForOpcode in serialization/sb3.js. The use of _ is incompatible with a protection mechanism in older versions, in which URLs were split and consequently deserialization attacks were prevented. NOTE: the scratch.mit.edu hosted service is not affected because of the lack of worker scripts.
Remediation
References
https://github.com/LLK/scratch-vm/pull/2476
https://scratch.mit.edu/discuss/topic/422904/?page=1#post-4223443
Related Vulnerabilities
CVE-2017-16031 Vulnerability in npm package socket.io
CVE-2019-1003080 Vulnerability in maven package org.jenkins-ci.plugins:openshift-deployer
CVE-2021-44906 Vulnerability in maven package org.webjars.npm:minimist
CVE-2015-7559 Vulnerability in maven package org.apache.activemq:activemq-core
CVE-2018-1000412 Vulnerability in maven package org.jenkins-ci.plugins:jira