Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310170513
HistoryJul 14, 2023 - 12:00 a.m.

vm2 <= 3.9.19 Multiple Sandbox Escape Vulnerabilities (Jul 2023)

2023-07-1400:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
6
vm2
sandbox escape
vulnerabilities
cve-2023-37466
cve-2023-37903
remote code execution
discontinued project

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.0%

vm2 is prone to multiple sandbox escape vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:vm2_project:vm2";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.170513");
  script_version("2023-10-13T05:06:10+0000");
  script_tag(name:"last_modification", value:"2023-10-13 05:06:10 +0000 (Fri, 13 Oct 2023)");
  script_tag(name:"creation_date", value:"2023-07-14 06:31:05 +0000 (Fri, 14 Jul 2023)");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-08-01 12:55:00 +0000 (Tue, 01 Aug 2023)");

  script_tag(name:"qod_type", value:"package");

  script_tag(name:"solution_type", value:"WillNotFix");

  script_cve_id("CVE-2023-37466", "CVE-2023-37903");

  script_name("vm2 <= 3.9.19 Multiple Sandbox Escape Vulnerabilities (Jul 2023)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_javascript_packages_consolidation.nasl");
  script_mandatory_keys("javascript_package/vm2/detected");

  script_tag(name:"summary", value:"vm2 is prone to multiple sandbox escape vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - CVE-2023-37466: Promise handler sanitization can be bypassed, allowing attackers to escape
  the sandbox and run arbitrary code.

  - CVE-2023-37903: Node.js custom inspect function allows attackers to escape the sandbox and run
  arbitrary code.");

  script_tag(name:"impact", value:"Exploiting these vulnerabilities leads to remote code execution,
  assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox.");

  script_tag(name:"affected", value:"vm2 version 3.9.19 and prior.");

  script_tag(name:"solution", value:"No solution was made available by the vendor.

  Vendor statement: The library contains critical security issues and should not be used for
  production! The maintenance of the project has been discontinued. Consider migrating your code to
  isolated-vm.");

  script_xref(name:"URL", value:"https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5");
  script_xref(name:"URL", value:"https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4");
  script_xref(name:"URL", value:"https://github.com/patriksimek/vm2#%EF%B8%8F-project-discontinued-%EF%B8%8F");
  script_xref(name:"URL", value:"https://github.com/patriksimek/vm2/issues/533");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if ( isnull( port = get_app_port( cpe:CPE ) ) )
  exit( 0 );

if ( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
  exit( 0 );

version = infos["version"];
location = infos["location"];

if ( version_is_less_equal( version:version, test_version:"3.9.19" ) ) {
  report = report_fixed_ver( installed_version:version, fixed_version:"None", install_path:location );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.7 High

AI Score

Confidence

High

0.005 Low

EPSS

Percentile

76.0%