Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xj72-wvfv-8985

Опубликовано: 12 апр. 2023
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

vm2 Sandbox Escape vulnerability

There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass handleException() and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context.

Impact

A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

Patches

This vulnerability was patched in the release of version 3.9.16 of vm2.

Workarounds

None.

References

Github Issue - https://github.com/patriksimek/vm2/issues/516 PoC - https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c

For more information

If you have any questions or comments about this advisory:

  • Open an issue in VM2

Thanks to Xion (SeungHyun Lee) of KAIST Hacking Lab for disclosing this vulnerability.

Пакеты

Наименование

vm2

npm
Затронутые версииВерсия исправления

< 3.9.16

3.9.16

EPSS

Процентиль: 96%
0.2341
Средний

9.8 Critical

CVSS3

Дефекты

CWE-913

Связанные уязвимости

CVSS3: 9.8
redhat
почти 3 года назад

There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.

CVSS3: 9.8
nvd
почти 3 года назад

There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.

CVSS3: 9.8
fstec
почти 3 года назад

Уязвимость преобразователя исходного кода библиотеки vm2 пакетного менеджера NPM, позволяющая нарушителю выйти из изолированной программной среды и выполнить произвольный код

EPSS

Процентиль: 96%
0.2341
Средний

9.8 Critical

CVSS3

Дефекты

CWE-913