Описание
Sandbox escape in Artemis Java Test Sandbox
Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.
Ссылки
- https://github.com/ls1intum/Ares/security/advisories/GHSA-883x-6fch-6wjx
- https://nvd.nist.gov/vuln/detail/CVE-2024-23683
- https://github.com/ls1intum/Ares/issues/15#issuecomment-996449371
- https://github.com/ls1intum/Ares/commit/af4f28a56e2fe600d8750b3b415352a0a3217392
- https://github.com/advisories/GHSA-883x-6fch-6wjx
- https://github.com/ls1intum/Ares/releases/tag/1.7.6
- https://vulncheck.com/advisories/vc-advisory-GHSA-883x-6fch-6wjx
Пакеты
Наименование
de.tum.in.ase:artemis-java-test-sandbox
maven
Затронутые версииВерсия исправления
< 1.7.6
1.7.6
Связанные уязвимости
CVSS3: 8.2
nvd
больше 1 года назад
Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.