GHSA-7jxr-cg7f-gpgv

Suggest an improvement
Source
https://github.com/advisories/GHSA-7jxr-cg7f-gpgv
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-7jxr-cg7f-gpgv/GHSA-7jxr-cg7f-gpgv.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-7jxr-cg7f-gpgv
Aliases
Published
2023-04-07T20:35:03Z
Modified
2023-11-01T05:01:46.781437Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
vm2 vulnerable to sandbox escape
Details

vm2 was not properly handling host objects passed to Error.prepareStackTrace in case of unhandled async errors.

  • vm2 version: ~3.9.14
  • Node version: 18.15.0, 19.8.1, 17.9.1

Impact

A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

Patches

This vulnerability was patched in the release of version 3.9.15 of vm2.

Workarounds

None.

Database specific
{
    "nvd_published_at": "2023-04-06T20:15:00Z",
    "github_reviewed_at": "2023-04-07T20:35:03Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-913"
    ]
}
References

Affected packages

npm / vm2

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.9.15