Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2019-10761: Fixes sandbox escape (#197) · patriksimek/vm2@4b22d70

This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the “sandboxed” context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing it to spawn a child_process and execute arbitrary code.

CVE

@@ -327,15 +327,15 @@ Decontextify.object = (object, traps, deepTraps, flags, mock) => {

return proxy;

};

Decontextify.value = (value, traps, deepTraps, flags, mock) => {

if (Contextified.has(value)) {

// Contextified object has returned back from vm

return Contextified.get(value);

} else if (Decontextify.proxies.has(value)) {

// Decontextified proxy already exists, reuse

return Decontextify.proxies.get(value);

}

try {

if (Contextified.has(value)) {

// Contextified object has returned back from vm

return Contextified.get(value);

} else if (Decontextify.proxies.has(value)) {

// Decontextified proxy already exists, reuse

return Decontextify.proxies.get(value);

}

switch (typeof value) {

case 'object’:

if (value === null) {

@@ -621,15 +621,15 @@ Contextify.object = (object, traps, deepTraps, flags, mock) => {

return proxy;

};

Contextify.value = (value, traps, deepTraps, flags, mock) => {

if (Decontextified.has(value)) {

// Decontextified object has returned back to vm

return Decontextified.get(value);

} else if (Contextify.proxies.has(value)) {

// Contextified proxy already exists, reuse

return Contextify.proxies.get(value);

}

try {

if (Decontextified.has(value)) {

// Decontextified object has returned back to vm

return Decontextified.get(value);

} else if (Contextify.proxies.has(value)) {

// Contextified proxy already exists, reuse

return Contextify.proxies.get(value);

}

switch (typeof value) {

case 'object’:

if (value === null) {

Related news

GHSA-wf5x-cr3r-xr77: vm2 before 3.6.11 vulnerable to sandbox escape

This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the "sandboxed" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing it to spawn a child_process and execute arbitrary code.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907