Логотип exploitDog
bind:CVE-2023-30547
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-30547

Количество 4

Количество 4

redhat логотип

CVE-2023-30547

почти 3 года назад

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.

CVSS3: 9.8
EPSS: Высокий
nvd логотип

CVE-2023-30547

почти 3 года назад

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-ch3r-j5x3-6q2m

почти 3 года назад

vm2 Sandbox Escape vulnerability

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2023-02202

почти 3 года назад

Уязвимость функции handleException() библиотеки vm2 пакетного менеджера NPM, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю выйти из изолированной программной среды и выполнить произвольный код

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2023-30547

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.

CVSS3: 9.8
84%
Высокий
почти 3 года назад
nvd логотип
CVE-2023-30547

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.

CVSS3: 9.8
84%
Высокий
почти 3 года назад
github логотип
GHSA-ch3r-j5x3-6q2m

vm2 Sandbox Escape vulnerability

CVSS3: 9.8
84%
Высокий
почти 3 года назад
fstec логотип
BDU:2023-02202

Уязвимость функции handleException() библиотеки vm2 пакетного менеджера NPM, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю выйти из изолированной программной среды и выполнить произвольный код

CVSS3: 9.8
84%
Высокий
почти 3 года назад

Уязвимостей на страницу