logo

CVE-2023-32314 vm2

Package

Manager: npm
Name: vm2
Vulnerable Version: >=0 <3.9.18

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.67965 pctl0.98535

Details

vm2 Sandbox Escape vulnerability A sandbox escape vulnerability exists in vm2 for versions up to 3.9.17. It abuses an unexpected creation of a host object based on the specification of `Proxy`. ### Impact A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. ### Patches This vulnerability was patched in the release of version `3.9.18` of `vm2`. ### Workarounds None. ### References PoC - https://gist.github.com/arkark/e9f5cf5782dec8321095be3e52acf5ac ### For more information If you have any questions or comments about this advisory: - Open an issue in [VM2](https://github.com/patriksimek/vm2) Thanks to @arkark (Takeshi Kaneko) of GMO Cybersecurity by Ierae, Inc. for disclosing this vulnerability.

Metadata

Created: 2023-05-15T20:50:51Z
Modified: 2023-05-15T20:50:51Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/05/GHSA-whpj-8f3w-67p5/GHSA-whpj-8f3w-67p5.json
CWE IDs: ["CWE-74"]
Alternative ID: GHSA-whpj-8f3w-67p5
Finding: F004
Auto approve: 1