CVE-2022-43406 – jenkins-plugin/workflow-cps-global-lib: Sandbox bypass vulnerability in Pipeline: Deprecated Groovy Libraries Plugin
https://notcve.org/view.php?id=CVE-2022-43406
A sandbox bypass vulnerability in Jenkins Pipeline: Deprecated Groovy Libraries Plugin 583.vf3b_454e43966 and earlier allows attackers with permission to define untrusted Pipeline libraries and to define and run sandboxed scripts, including Pipelines, to bypass the sandbox protection and execute arbitrary code in the context of the Jenkins controller JVM. Una vulnerabilidad de omisión del sandbox en Jenkins Pipeline: Deprecated Groovy Libraries Plugin versiones 583.vf3b_454e43966 y anteriores, permite a atacantes con permiso para definir bibliotecas de Pipeline que no son confiables y para definir y ejecutar scripts con sandbox, incluyendo Pipelines, omitir la protección del sandbox y ejecutar código arbitrario en el contexto de la JVM del controlador de Jenkins A sandbox bypass vulnerability was found in several Jenkins plugins. • http://www.openwall.com/lists/oss-security/2022/10/19/3 https://www.jenkins.io/security/advisory/2022-10-19/#SECURITY-2824%20%282%29 https://access.redhat.com/security/cve/CVE-2022-43406 https://bugzilla.redhat.com/show_bug.cgi?id=2136370 • CWE-693: Protection Mechanism Failure •
CVE-2022-39266 – isolated-vm has vulnerable CachedDataOptions in API
https://notcve.org/view.php?id=CVE-2022-39266
In versions 4.3.6 and prior, if the untrusted v8 cached data is passed to the API through CachedDataOptions, attackers can bypass the sandbox and run arbitrary code in the nodejs process. ... En versiones 4.3.6 y anteriores, si los datos en caché de v8 que no son confiables son pasados a la API mediante CachedDataOptions, los atacantes pueden omitir el sandbox y ejecutar código arbitrario en el proceso de nodejs. • https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8 https://github.com/laverdet/isolated-vm/commits/v4.3.7 https://github.com/laverdet/isolated-vm/issues/379 https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv • CWE-20: Improper Input Validation CWE-693: Protection Mechanism Failure •
CVE-2022-3309
https://notcve.org/view.php?id=CVE-2022-3309
Use after free in assistant in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: Medium) Use-after-free en el asistente de Google Chrome en ChromeOS anterior a la versión 106.0.5249.62 permitía a un atacante remoto convencer a un usuario de realizar gestos de interfaz de usuario específicos para potencialmente realizar un escape de la sandbox mediante gestos de interfaz de usuario específicos. • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html https://crbug.com/1348415 • CWE-416: Use After Free •
CVE-2022-3311
https://notcve.org/view.php?id=CVE-2022-3311
Use after free in import in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) Use-after-free en la función importar en Google Chrome anterior a la versión 106.0.5249.62 permitió a un atacante remoto que había comprometido un proceso de WebUI realizar potencialmente un escape de la sandbox a través de una página HTML manipulada. • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html https://crbug.com/1302813 • CWE-416: Use After Free •
CVE-2022-3314
https://notcve.org/view.php?id=CVE-2022-3314
Use after free in logging in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) Use-after-free para iniciar sesión en Google Chrome antes de la versión 106.0.5249.62 permitía a un atacante remoto que había comprometido un proceso de WebUI realizar potencialmente un escape de la sandbox a través de una página HTML manipulada. • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html https://crbug.com/1328708 • CWE-416: Use After Free •