vm2 is an open source vm/sandbox for Node.js. In vm2 for versions up to and including 3.9.19, Node.js custom inspect function allows attackers to escape the sandbox and run arbitrary code. This may result in Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. There are no patches and no known workarounds. Users are advised to find an alternative software.
References
Link | Resource |
---|---|
https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230831-0007/ | Third Party Advisory |
https://github.com/patriksimek/vm2/security/advisories/GHSA-g644-9gfx-q4q4 | Vendor Advisory |
https://security.netapp.com/advisory/ntap-20230831-0007/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-07-21 20:15
Updated : 2024-11-21 08:12
NVD link : CVE-2023-37903
Mitre link : CVE-2023-37903
CVE.ORG link : CVE-2023-37903
JSON object : View
Products Affected
vm2_project
- vm2
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')