Researchers Discover Critical Remote Code Execution Flaw in vm2 Sandbox Library

April 8, 2023Rabbi LakshmananVulnerability/Software

vm2 sandbox library

The maintainer of the vm2 JavaScript sandbox module has shipped a patch to address a critical flaw that can be exploited to break security boundaries and execute arbitrary shellcode.

This flaw, which affects all versions up to and including 3.9.14, was reported by researchers at the South Korea-based KAIST WSP Lab on April 6, 2023 and was fixed in version 3.9.15 on Friday. Prompted vm2 to release the program.

vm2 said in the advisory, “Attackers can bypass sandbox protections and gain remote code execution privileges on the host running the sandbox.

This vulnerability has been assigned the identified CVE-2023-29017 and is rated 9.8 on the CVSS scoring system. This issue is due to improper handling of errors that occur in asynchronous functions.

vm2 is a popular library used to run untrusted code in an isolated environment in Node.js. It is downloaded nearly 4 million times each week and used in 721 packages.

upcoming webinars

Learn How to Protect Your Identity Perimeter – A Proven Strategy

Improve your business security in our upcoming expert-led cybersecurity webinar: Exploring Identity Perimeter Strategies!

Don’t miss it – secure your seat!

KAIST security researcher Seongil Wi has also made available two different variants of proof-of-concept (PoC) exploits for CVE-2023-29017. These bypass sandbox protection and allow you to create an empty file named ‘flag’ on the host. .

This disclosure comes almost six months after vm2 resolved another critical bug (CVE-2022-36067, CVSS score: 10). This bug could have been weaponized to perform arbitrary operations on the underlying machine.

Did you find this article interesting?Please follow us twitter and LinkedIn to read more exclusive content we post.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *