CVE-2023-32313
Inspect method manipulation in vm2
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
vm2 is a sandbox that can run untrusted code with Node's built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node `inspect` method and edit options for `console.log`. As a result a threat actor can edit options for the `console.log` command. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. Users unable to upgrade may make the `inspect` method readonly with `vm.readonly(inspect)` after creating a vm.
A flaw was found in the vm2. After making a vm, the inspect method is read-write for console.log, which allows an attacker to edit options for console.log. This issue impacts the integrity by changing the log subsystem.
Multicluster Engine for Kubernetes 2.2.4 images Multicluster engine for Kubernetes provides the foundational components that are necessary for the centralized management of multiple Kubernetes-based clusters across data centers, public clouds, and private clouds. You can use the engine to create new Red Hat OpenShift Container Platform clusters or to bring existing Kubernetes-based clusters under management by importing them. After the clusters are managed, you can use the APIs that are provided by the engine to distribute configuration based on placement policy.
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2023-05-08 CVE Reserved
- 2023-05-15 CVE Published
- 2025-01-22 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550 | Product | |
https://github.com/patriksimek/vm2/releases/tag/3.9.18 | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/patriksimek/vm2/commit/5206ba25afd86ef547a2c9d48d46ca7a9e6ec238 | 2023-05-24 |
URL | Date | SRC |
---|---|---|
https://github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v | 2023-05-24 | |
https://access.redhat.com/security/cve/CVE-2023-32313 | 2023-05-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2208377 | 2023-05-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vm2 Project Search vendor "Vm2 Project" | Vm2 Search vendor "Vm2 Project" for product "Vm2" | < 3.9.18 Search vendor "Vm2 Project" for product "Vm2" and version " < 3.9.18" | node.js |
Affected
|