There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.
References
Link | Resource |
---|---|
https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c | Exploit Third Party Advisory |
https://github.com/patriksimek/vm2/commit/24c724daa7c09f003e556d7cd1c7a8381cb985d7 | Patch |
https://github.com/patriksimek/vm2/issues/516 | Issue Tracking Patch |
https://github.com/patriksimek/vm2/releases/tag/3.9.16 | Release Notes |
https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985 | Vendor Advisory |
Configurations
History
25 Apr 2023, 15:14
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://github.com/patriksimek/vm2/releases/tag/3.9.16 - Release Notes | |
References | (MISC) https://github.com/patriksimek/vm2/commit/24c724daa7c09f003e556d7cd1c7a8381cb985d7 - Patch | |
References | (MISC) https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985 - Vendor Advisory | |
References | (MISC) https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/patriksimek/vm2/issues/516 - Issue Tracking, Patch | |
CPE | cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
14 Apr 2023, 22:45
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-04-14 19:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-29199
Mitre link : CVE-2023-29199
CVE.ORG link : CVE-2023-29199
JSON object : View
Products Affected
vm2_project
- vm2
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources