Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-32313

Опубликовано: 15 мая 2023
Источник: redhat
CVSS3: 5.3
EPSS Низкий

Описание

vm2 is a sandbox that can run untrusted code with Node's built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node inspect method and edit options for console.log. As a result a threat actor can edit options for the console.log command. This vulnerability was patched in the release of version 3.9.18 of vm2. Users are advised to upgrade. Users unable to upgrade may make the inspect method readonly with vm.readonly(inspect) after creating a vm.

A flaw was found in the vm2. After making a vm, the inspect method is read-write for console.log, which allows an attacker to edit options for console.log. This issue impacts the integrity by changing the log subsystem.

Меры по смягчению последствий

After creating a vm, make the inspect method readonly with vm.readonly(inspect).

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-755->CWE-74

EPSS

Процентиль: 65%
0.005
Низкий

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
больше 2 лет назад

vm2 is a sandbox that can run untrusted code with Node's built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node `inspect` method and edit options for `console.log`. As a result a threat actor can edit options for the `console.log` command. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. Users unable to upgrade may make the `inspect` method readonly with `vm.readonly(inspect)` after creating a vm.

CVSS3: 5.3
github
больше 2 лет назад

vm2 vulnerable to Inspect Manipulation

EPSS

Процентиль: 65%
0.005
Низкий

5.3 Medium

CVSS3