Sandbox escape in the JavaScript Task feature of Google Cloud Application Integration allows an actor to execute arbitrary unsandboxed code via crafted JavaScript code executed by the Rhino engine. Effective January 24, 2025, Application Integration will no longer support Rhino as the JavaScript execution engine. No further fix actions are needed.
References
Link | Resource |
---|---|
https://cloud.google.com/application-integration/docs/release-notes#January_23_2025 | Release Notes |
Configurations
History
30 Jul 2025, 18:14
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
First Time |
Google application Integration
|
|
CPE | cpe:2.3:a:google:application_integration:*:*:*:*:*:*:*:* | |
Summary |
|
|
References | () https://cloud.google.com/application-integration/docs/release-notes#January_23_2025 - Release Notes |
06 Feb 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-06 12:15
Updated : 2025-07-30 18:14
NVD link : CVE-2025-0982
Mitre link : CVE-2025-0982
CVE.ORG link : CVE-2025-0982
JSON object : View
Products Affected
- application_integration
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere