Описание
Sandbox escape in Artemis Java Test Sandbox
Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.
Ссылки
- https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4
- https://nvd.nist.gov/vuln/detail/CVE-2024-23682
- https://github.com/ls1intum/Ares/issues/15
- https://github.com/advisories/GHSA-227w-wv4j-67h4
- https://github.com/ls1intum/Ares/releases/tag/1.8.0
- https://vulncheck.com/advisories/vc-advisory-GHSA-227w-wv4j-67h4
Пакеты
Наименование
de.tum.in.ase:artemis-java-test-sandbox
maven
Затронутые версииВерсия исправления
< 1.8.0
1.8.0
Связанные уязвимости
CVSS3: 8.2
nvd
около 2 лет назад
Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.