You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Vulnerable Package issue exists @ Npm-vm2-3.9.11 in branch main
The NPM package vm2 has a vulnerability in versions prior to 3.9.16 that can allow malicious actors to bypass handleException() to escape the sandbox which can then lead to Remote Code Execution (RCE) on the host running the sandbox. The flaw is in the way that the transformer function preprocesses code which allows an attacker to later bypass a handleException() which in its turn allows to raise a host exception. This can then be used to access the host "Function" constructor which allows to escape the sandbox and gain arbitrary code execution on the host.
Vulnerable Package issue exists @ Npm-vm2-3.9.11 in branch main
The NPM package
vm2
has a vulnerability in versions prior to 3.9.16 that can allow malicious actors to bypasshandleException()
to escape the sandbox which can then lead to Remote Code Execution (RCE) on the host running the sandbox. The flaw is in the way that thetransformer
function preprocesses code which allows an attacker to later bypass ahandleException()
which in its turn allows to raise a host exception. This can then be used to access the host "Function" constructor which allows to escape the sandbox and gain arbitrary code execution on the host.Namespace: westonphillips
Repository: CheckmarxOnePOV
Repository Url: https://github.com/westonphillips/CheckmarxOnePOV
CxAST-Project: westonphillips/CheckmarxOnePOV
CxAST platform scan: 6a8170d0-38fa-4efc-81df-42628474102c
Branch: main
Application: CheckmarxOnePOV
Severity: HIGH
State: NOT_IGNORED
Status: RECURRENT
CWE: CWE-913
Additional Info
Attack vector: NETWORK
Attack complexity: LOW
Confidentiality impact: HIGH
Availability impact: HIGH
Remediation Upgrade Recommendation: 3.9.16
References
Advisory
POC/Exploit
Release Note
Issue
Commit
The text was updated successfully, but these errors were encountered: