Vulnerability Details : CVE-2022-23923
All versions of package jailed are vulnerable to Sandbox Bypass via an exported alert() method which can access the main application. Exported methods are stored in the application.remote object.
Exploit prediction scoring system (EPSS) score for CVE-2022-23923
Probability of exploitation activity in the next 30 days: 0.29%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 66 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2022-23923
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
nvd@nist.gov |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
nvd@nist.gov |
8.6
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L |
3.9
|
4.7
|
report@snyk.io |
References for CVE-2022-23923
-
https://snyk.io/vuln/SNYK-JS-JAILED-2391490
Sandbox Bypass in jailed | CVE-2022-23923 | SnykExploit;Third Party Advisory
-
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254
Sandbox Bypass in org.webjars.bower:jailed | CVE-2022-23923 | SnykExploit;Third Party Advisory
Products affected by CVE-2022-23923
- cpe:2.3:a:jailed_project:jailed:*:*:*:*:*:node.js:*:*