CVE-2024-28189

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28189
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-28189.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-28189
Related
  • GHSA-3xpw-36v7-2cmg
  • GHSA-h9g2-45c8-89cf
Published
2024-04-18T14:40:29.320Z
Modified
2025-11-30T18:43:17.615969Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
Judge0 vulnerable to Sandbox Escape Patch Bypass via chown running on Symbolic Link
Details

Judge0 is an open-source online code execution system. The application uses the UNIX chown command on an untrusted file within the sandbox. An attacker can abuse this by creating a symbolic link (symlink) to a file outside the sandbox, allowing the attacker to run chown on arbitrary files outside of the sandbox. This vulnerability is not impactful on it's own, but it can be used to bypass the patch for CVE-2024-28185 and obtain a complete sandbox escape. This vulnerability is fixed in 1.13.1.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/28xxx/CVE-2024-28189.json",
    "cwe_ids": [
        "CWE-59",
        "CWE-61"
    ],
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/judge0/judge0

Affected ranges

Type
GIT
Repo
https://github.com/judge0/judge0
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.2

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.1.4
v1.1.5
v1.10.0
v1.11.0
v1.12.0
v1.13.0
v1.2.0
v1.2.1
v1.2.2
v1.3.0
v1.3.1
v1.4.0
v1.5.0
v1.6.0
v1.7.0
v1.7.1
v1.8.0
v1.9.0