Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-36067

Опубликовано: 07 сент. 2022
Источник: redhat
CVSS3: 10
EPSS Высокий

Описание

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

A flaw was found in the vm2 sandbox when running untrusted code, as the sandbox setup does not manage proper exception handling. This flaw allows an attacker to bypass the sandbox protections and gain remote code execution on the hypervisor host or the host which is running the sandbox.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Advanced Cluster Management for Kubernetes 2rhacm2/console-rhel8Affected
Multicluster Engine for Kubernetesmulticluster-engine-agent-service-containerFixedRHSA-2022:642212.09.2022
Multicluster Engine for Kubernetesmulticluster-engine-apiserver-network-proxy-containerFixedRHSA-2022:642212.09.2022
Multicluster Engine for Kubernetesmulticluster-engine-assisted-image-service-containerFixedRHSA-2022:642212.09.2022
Multicluster Engine for Kubernetesmulticluster-engine-assisted-installer-agent-containerFixedRHSA-2022:642212.09.2022
Multicluster Engine for Kubernetesmulticluster-engine-assisted-installer-containerFixedRHSA-2022:642212.09.2022
Multicluster Engine for Kubernetesmulticluster-engine-assisted-installer-reporter-containerFixedRHSA-2022:642212.09.2022
Multicluster Engine for Kubernetesmulticluster-engine-aws-encryption-provider-containerFixedRHSA-2022:642212.09.2022
Multicluster Engine for Kubernetesmulticluster-engine-cluster-api-containerFixedRHSA-2022:642212.09.2022
Multicluster Engine for Kubernetesmulticluster-engine-cluster-api-provider-agent-containerFixedRHSA-2022:642212.09.2022

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-913

EPSS

Процентиль: 99%
0.85411
Высокий

10 Critical

CVSS3

Связанные уязвимости

CVSS3: 10
nvd
больше 3 лет назад

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

CVSS3: 10
github
больше 3 лет назад

vm2 vulnerable to Sandbox Escape resulting in Remote Code Execution on host

CVSS3: 10
fstec
больше 3 лет назад

Уязвимость библиотеки vm2 пакетного менеджера NPM, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.85411
Высокий

10 Critical

CVSS3