2023-12-22 17:00:28 +00:00
{
"id" : "CVE-2023-51661" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2023-12-22T15:15:08.377" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T08:38:33.190" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-12-22 17:00:28 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Wasmer is a WebAssembly runtime that enables containers to run anywhere: from Desktop to the Cloud, Edge and even the browser. Wasm programs can access the filesystem outside of the sandbox. Service providers running untrusted Wasm code on Wasmer can unexpectedly expose the host filesystem. This vulnerability has been patched in version 4.2.4."
2024-01-03 05:00:28 +00:00
} ,
{
"lang" : "es" ,
"value" : "Wasmer es un runtime de WebAssembly que permite que los contenedores se ejecuten en cualquier lugar: desde el escritorio hasta la nube, Edge e incluso el navegador. Los programas Wasm pueden acceder al sistema de archivos fuera del entorno limitado. Los proveedores de servicios que ejecutan c\u00f3digo Wasm que no es de confianza en Wasmer pueden exponer inesperadamente el sistema de archivos del host. Esta vulnerabilidad ha sido parcheada en la versi\u00f3n 4.2.4."
2023-12-22 17:00:28 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-01-03 05:00:28 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
2024-01-03 05:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.4 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
2024-01-03 05:00:28 +00:00
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2024-12-08 03:06:42 +00:00
"scope" : "UNCHANGED" ,
2024-01-03 05:00:28 +00:00
"confidentialityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
2024-01-03 05:00:28 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.5 ,
"impactScore" : 5.9
2024-01-03 05:00:28 +00:00
} ,
2023-12-22 17:00:28 +00:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-12-22 17:00:28 +00:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" ,
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "NETWORK" ,
2023-12-22 17:00:28 +00:00
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
2024-12-08 03:06:42 +00:00
"scope" : "CHANGED" ,
2023-12-22 17:00:28 +00:00
"confidentialityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE"
2023-12-22 17:00:28 +00:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
2023-12-22 17:00:28 +00:00
}
]
} ,
"weaknesses" : [
{
2024-12-08 03:06:42 +00:00
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
2024-01-03 05:00:28 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-284"
2024-01-03 05:00:28 +00:00
}
]
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-12-22 17:00:28 +00:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "NVD-CWE-Other"
2023-12-22 17:00:28 +00:00
}
]
}
] ,
2024-01-03 05:00:28 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wasmer:wasmer:*:*:*:*:*:rust:*:*" ,
"versionStartIncluding" : "3.0.0" ,
"versionEndExcluding" : "4.2.4" ,
"matchCriteriaId" : "14DB3027-8D4F-47CB-9B0C-9603C74C4299"
}
]
}
]
}
] ,
2023-12-22 17:00:28 +00:00
"references" : [
{
"url" : "https://github.com/wasmerio/wasmer/commit/4d63febf9d8b257b0531963b85df48d45d0dbf3c" ,
2024-01-03 05:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Patch"
]
2023-12-22 17:00:28 +00:00
} ,
{
"url" : "https://github.com/wasmerio/wasmer/issues/4267" ,
2024-01-03 05:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Issue Tracking"
]
2023-12-22 17:00:28 +00:00
} ,
{
"url" : "https://github.com/wasmerio/wasmer/security/advisories/GHSA-4mq4-7rw3-vm5j" ,
2024-01-03 05:00:28 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://github.com/wasmerio/wasmer/commit/4d63febf9d8b257b0531963b85df48d45d0dbf3c" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "https://github.com/wasmerio/wasmer/issues/4267" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Issue Tracking"
]
} ,
{
"url" : "https://github.com/wasmerio/wasmer/security/advisories/GHSA-4mq4-7rw3-vm5j" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2023-12-22 17:00:28 +00:00
}
]
}