CVE-2023-30547
Sandbox Escape in vm2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
6Exploited in Wild
-Decision
Descriptions
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
A flaw was found in the vm2 sandbox. When exception handling is triggered, an unsanitized host is not managed properly. This issue may allow an attacker to bypass the sandbox protections, which can lead to remote code execution on the hypervisor host or the host that is running the sandbox.
Multicluster Engine for Kubernetes 2.2.3 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy. Issues addressed include a denial of service vulnerability.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-04-12 CVE Reserved
- 2023-04-17 CVE Published
- 2023-12-14 First Exploit
- 2025-02-05 CVE Updated
- 2025-04-02 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
- CWE-755: Improper Handling of Exceptional Conditions
CAPEC
References (10)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/rvizx/CVE-2023-30547 | 2023-12-14 | |
https://github.com/Cur1iosity/CVE-2023-30547 | 2024-02-14 | |
https://github.com/user0x1337/CVE-2023-30547 | 2024-02-08 | |
https://github.com/junnythemarksman/CVE-2023-30547 | 2024-06-04 | |
https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244 | 2025-02-05 | |
https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m | 2025-02-05 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-30547 | 2023-04-20 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2187608 | 2023-04-20 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vm2 Project Search vendor "Vm2 Project" | Vm2 Search vendor "Vm2 Project" for product "Vm2" | <= 3.9.16 Search vendor "Vm2 Project" for product "Vm2" and version " <= 3.9.16" | node.js |
Affected
|