All versions of package jailed are vulnerable to Sandbox Bypass via an exported alert() method which can access the main application. Exported methods are stored in the application.remote object.
References
Link | Resource |
---|---|
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-JAILED-2391490 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2441254 | Exploit Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-JAILED-2391490 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-05-01 16:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-23923
Mitre link : CVE-2022-23923
CVE.ORG link : CVE-2022-23923
JSON object : View
Products Affected
jailed_project
- jailed
CWE