Vulnerability Details : CVE-2023-29199
There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.16` of `vm2`.
Vulnerability category: Execute code
Products affected by CVE-2023-29199
- cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-29199
2.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-29199
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
GitHub, Inc. |
CWE ids for CVE-2023-29199
-
The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements.Assigned by: security-advisories@github.com (Primary)
References for CVE-2023-29199
-
https://github.com/patriksimek/vm2/issues/516
Sandbox Escape in vm2@3.9.15 · Issue #516 · patriksimek/vm2 · GitHubIssue Tracking;Patch
-
https://github.com/patriksimek/vm2/security/advisories/GHSA-xj72-wvfv-8985
Sandbox Escape · Advisory · patriksimek/vm2 · GitHubVendor Advisory
-
https://github.com/patriksimek/vm2/commit/24c724daa7c09f003e556d7cd1c7a8381cb985d7
Release 3.9.16 · patriksimek/vm2@24c724d · GitHubPatch
-
https://github.com/patriksimek/vm2/releases/tag/3.9.16
Release 3.9.16 · patriksimek/vm2 · GitHubRelease Notes
-
https://gist.github.com/leesh3288/f05730165799bf56d70391f3d9ea187c
Sandbox Escape in vm2@3.9.15 · GitHubExploit;Third Party Advisory
Jump to