CVE-2022-3314
https://notcve.org/view.php?id=CVE-2022-3314
Use after free in logging in Google Chrome prior to 106.0.5249.62 allowed a remote attacker who had compromised a WebUI process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) Use-after-free para iniciar sesión en Google Chrome antes de la versión 106.0.5249.62 permitía a un atacante remoto que había comprometido un proceso de WebUI realizar potencialmente un escape de la sandbox a través de una página HTML manipulada. • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html https://crbug.com/1328708 • CWE-416: Use After Free •
CVE-2022-3308
https://notcve.org/view.php?id=CVE-2022-3308
Insufficient policy enforcement in developer tools in Google Chrome prior to 106.0.5249.62 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium) La aplicación insuficiente de políticas en las herramientas de desarrollo de Google Chrome anteriores a la versión 106.0.5249.62 permitía a un atacante remoto realizar potencialmente un escape de la sandbox a través de una página HTML manipulada. • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop_27.html https://crbug.com/1342722 •
CVE-2022-3075 – Google Chromium Mojo Insufficient Data Validation Vulnerability
https://notcve.org/view.php?id=CVE-2022-3075
Insufficient data validation in Mojo in Google Chrome prior to 105.0.5195.102 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. Una comprobación insuficiente de datos en Mojo en Google Chrome versiones anteriores a 105.0.5195.102, permitía a un atacante remoto que hubiera comprometido el proceso de renderización llevar a cabo un filtrado de sandbox por medio de una página HTML diseñada. Google Chromium Mojo contains an insufficient data validation vulnerability that allows a remote attacker, who has compromised the renderer process, to potentially perform a sandbox escape via a crafted HTML page. • https://chromereleases.googleblog.com/2022/09/stable-channel-update-for-desktop.html https://crbug.com/1358134 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE https://security.gentoo.org/glsa/202209-23 • CWE-20: Improper Input Validation •
CVE-2022-40635 – Improper Control of Dynamically-Managed Code Resources in Crafter Studio
https://notcve.org/view.php?id=CVE-2022-40635
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. Una vulnerabilidad de Control Inapropiado de los Recursos de Código Administrados Dinámicamente en Crafter Studio de Crafter CMS permite a desarrolladores autenticados ejecutar comandos del Sistema Operativo por medio de Groovy Sandbox Bypass • https://github.com/mbadanoiu/CVE-2022-40635 https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051602 • CWE-913: Improper Control of Dynamically-Managed Code Resources •
CVE-2022-36067 – vm2 vulnerable to Sandbox Escape before v3.9.11
https://notcve.org/view.php?id=CVE-2022-36067
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. ... En versiones anteriores a 3.9.11, un actor de la amenaza puede omitir las protecciones del sandbox para conseguir derechos de ejecución de código remoto en el host que ejecuta el sandbox. ... A flaw was found in the vm2 sandbox when running untrusted code, as the sandbox setup does not manage proper exception handling. This flaw allows an attacker to bypass the sandbox protections and gain remote code execution on the hypervisor host or the host which is running the sandbox. • https://github.com/Prathamrajgor/Exploit-For-CVE-2022-36067 https://github.com/0x1nsomnia/CVE-2022-36067-vm2-POC-webapp https://github.com/patriksimek/vm2/blob/master/lib/setup-sandbox.js#L71 https://github.com/patriksimek/vm2/commit/d9a7f3cc995d3d861e1380eafb886cb3c5e2b873#diff-b1a515a627d820118e76d0e323fe2f0589ed50a1eacb490f6c3278fe3698f164 https://github.com/patriksimek/vm2/issues/467 https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq https://security.netapp.com/advisory/ntap-20221017-0002 https: • CWE-913: Improper Control of Dynamically-Managed Code Resources •