Lucene search

K
githubGitHub Advisory DatabaseGHSA-CH3R-J5X3-6Q2M
HistoryApr 20, 2023 - 2:37 p.m.

vm2 Sandbox Escape vulnerability

2023-04-2014:37:53
CWE-74
GitHub Advisory Database
github.com
23
vm2
sandbox
escape
vulnerability
arbitrary code execution
patch
remote code execution
host context

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside handleException() which can be used to escape the sandbox and run arbitrary code in host context.

Impact

A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

Patches

This vulnerability was patched in the release of version 3.9.17 of vm2.

Workarounds

None.

References

PoC - https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244

For more information

If you have any questions or comments about this advisory:

  • Open an issue in VM2

Thanks to Xion (SeungHyun Lee) of KAIST Hacking Lab for disclosing this vulnerability.

CPE configuration

Vulners
github_advisory_databasevm2Range<3.9.17
CPENameOperatorVersion
vm2lt3.9.17

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H