CVE-2021-31010 – Apple iOS, macOS, watchOS Sandbox Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2021-31010
A sandboxed process may be able to circumvent sandbox restrictions. ... Un proceso de sandbox puede ser capaz de eludir las restricciones de sandbox. Apple era consciente de un informe de que este problema podría haber sido explotado activamente en el momento de la publicación In affected versions of Apple iOS, macOS, and watchOS, a sandboxed process may be able to circumvent sandbox restrictions. • https://support.apple.com/en-us/HT212804 https://support.apple.com/en-us/HT212805 https://support.apple.com/en-us/HT212806 https://support.apple.com/en-us/HT212807 https://support.apple.com/en-us/HT212824 • CWE-502: Deserialization of Untrusted Data •
CVE-2021-30975
https://notcve.org/view.php?id=CVE-2021-30975
A malicious OSAX scripting addition may bypass Gatekeeper checks and circumvent sandbox restrictions. ...  Una adición maliciosa de secuencias de comandos OSAX puede omitir las comprobaciones de Gatekeeper e impedir las restricciones del sandbox • https://support.apple.com/en-us/HT212978 https://support.apple.com/en-us/HT212979 https://support.apple.com/en-us/HT212981 • CWE-863: Incorrect Authorization •
CVE-2021-30968
https://notcve.org/view.php?id=CVE-2021-30968
A validation issue related to hard link behavior was addressed with improved sandbox restrictions. ... A malicious application may be able to bypass certain Privacy preferences. Se abordó un problema de comprobación relacionado con el comportamiento de los enlaces físicos con restricciones del sandbox mejoradas. • https://support.apple.com/en-us/HT212975 https://support.apple.com/en-us/HT212976 https://support.apple.com/en-us/HT212978 https://support.apple.com/en-us/HT212979 https://support.apple.com/en-us/HT212980 https://support.apple.com/en-us/HT212981 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-2021-32829 – Post-authentication Remote Code Execution (RCE) in ZStack REST API
https://notcve.org/view.php?id=CVE-2021-32829
Affected versions of ZStack REST API are vulnerable to post-authentication Remote Code Execution (RCE) via bypass of the Groovy shell sandbox. ... Even though the sandbox heavily restricts the receiver types to a small set of allowed types, the sandbox is non effective at controlling any code placed in Java annotations and therefore vulnerable to meta-programming escapes. ... Las versiones afectadas de la API REST de ZStack son vulnerables a una ejecución de código remota (RCE) después de la autenticación, por medio de una omisión del sandbox shell de Groovy. ... A pesar de que el sandbox restringe fuertemente los tipos del receptor a un pequeño conjunto de tipos permitidos, el sandbox no es efectivo en el control de cualquier código colocado en las anotaciones de Java y por lo tanto es vulnerable a los escapes de meta-programación. • https://blog.orange.tw/2019/02/abusing-meta-programming-for-unauthenticated-rce.html https://github.com/zstackio/zstack/security/advisories/GHSA-6xgq-7rqg-x3q5 https://securitylab.github.com/advisories/GHSL-2021-065-zstack • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-863: Incorrect Authorization •
CVE-2021-30571
https://notcve.org/view.php?id=CVE-2021-30571
Insufficient policy enforcement in DevTools in Google Chrome prior to 92.0.4515.107 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page. Una aplicación insuficiente de políticas en DevTools en Google Chrome anterior a versión 92.0.4515.107, permitía que un atacante que convencía a un usuario de instalar una extensión maliciosa pudiera potencialmente llevar a cabo un escape de la sandbox por medio de una página HTML diseñada • https://chromereleases.googleblog.com/2021/07/stable-channel-update-for-desktop_20.html https://crbug.com/1101897 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LVY4WIWTVVYKQMROJJS365TZBKEARCF https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPJPUSAWIJMQFBQQQYXAICLI4EKFQOH6 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QW4R2K5HVJ4R6XDZYOJCCFPIN2XHNS3L • CWE-863: Incorrect Authorization •