cve/2023/CVE-2023-30547.md

26 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-30547](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30547)
![](https://img.shields.io/static/v1?label=Product&message=vm2&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%203.9.17%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%3A%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brighgreen)
### Description
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside `handleException()` which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version `3.9.17` of `vm2`. There are no known workarounds for this vulnerability. Users are advised to upgrade.
### POC
#### Reference
- https://gist.github.com/leesh3288/381b230b04936dd4d74aaf90cc8bb244
- https://github.com/patriksimek/vm2/security/advisories/GHSA-ch3r-j5x3-6q2m
#### Github
- https://github.com/Af7eR9l0W/HTB-Codify
- https://github.com/Cur1iosity/CVE-2023-30547
- https://github.com/Maladra/Write-Up-Codify
2024-06-10 07:22:43 +00:00
- https://github.com/jakabakos/vm2-sandbox-escape-exploits
2024-05-25 21:48:12 +02:00
- https://github.com/karimhabush/cyberowl
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/rvizx/CVE-2023-30547
- https://github.com/user0x1337/CVE-2023-30547