Lucene search

K
githubGitHub Advisory DatabaseGHSA-23RX-79R7-6CPX
HistoryJan 19, 2024 - 9:30 p.m.

Sandbox escape in Artemis Java Test Sandbox

2024-01-1921:30:36
GitHub Advisory Database
github.com
4
artemis java test sandbox
vulnerability
java
invocationtargetexception
sandbox escape

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

EPSS

0

Percentile

5.1%

Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.

Affected configurations

Vulners
Node
de.tum.in.aseartemis-java-test-sandboxRange<1.7.6
VendorProductVersionCPE
de.tum.in.aseartemis-java-test-sandbox*cpe:2.3:a:de.tum.in.ase:artemis-java-test-sandbox:*:*:*:*:*:*:*:*

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

7.8

Confidence

Low

EPSS

0

Percentile

5.1%

Related for GHSA-23RX-79R7-6CPX