Логотип exploitDog
bind:CVE-2023-29199
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-29199

Количество 4

Количество 4

redhat логотип

CVE-2023-29199

почти 3 года назад

There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.

CVSS3: 9.8
EPSS: Средний
nvd логотип

CVE-2023-29199

почти 3 года назад

There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-xj72-wvfv-8985

почти 3 года назад

vm2 Sandbox Escape vulnerability

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2023-02119

почти 3 года назад

Уязвимость преобразователя исходного кода библиотеки vm2 пакетного менеджера NPM, позволяющая нарушителю выйти из изолированной программной среды и выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-29199

There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.

CVSS3: 9.8
23%
Средний
почти 3 года назад
nvd логотип
CVE-2023-29199

There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.

CVSS3: 9.8
23%
Средний
почти 3 года назад
github логотип
GHSA-xj72-wvfv-8985

vm2 Sandbox Escape vulnerability

CVSS3: 9.8
23%
Средний
почти 3 года назад
fstec логотип
BDU:2023-02119

Уязвимость преобразователя исходного кода библиотеки vm2 пакетного менеджера NPM, позволяющая нарушителю выйти из изолированной программной среды и выполнить произвольный код

CVSS3: 9.8
23%
Средний
почти 3 года назад

Уязвимостей на страницу