Lucene search

K
githubGitHub Advisory DatabaseGHSA-7JXR-CG7F-GPGV
HistoryApr 07, 2023 - 8:35 p.m.

vm2 vulnerable to sandbox escape

2023-04-0720:35:03
CWE-913
GitHub Advisory Database
github.com
70
vm2
sandbox escape
vulnerability
patched
node version
remote code execution
async errors
threat actor
host objects
patches
vm2 version
workarounds
software

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.017

Percentile

87.9%

vm2 was not properly handling host objects passed to Error.prepareStackTrace in case of unhandled async errors.

  • vm2 version: ~3.9.14
  • Node version: 18.15.0, 19.8.1, 17.9.1

Impact

A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

Patches

This vulnerability was patched in the release of version 3.9.15 of vm2.

Workarounds

None.

Affected configurations

Vulners
Node
vm2_projectvm2Range<3.9.15node.js

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

EPSS

0.017

Percentile

87.9%