vm2 is a sandbox that can run untrusted code with Node's built-in modules. A sandbox escape vulnerability exists in vm2 for versions up to and including 3.9.17. It abuses an unexpected creation of a host object based on the specification of `Proxy`. As a result a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version `3.9.18` of `vm2`. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Project Subscriptions

Vendors Products
Multicluster Engine Subscribe
Vm2 Project Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-whpj-8f3w-67p5 vm2 Sandbox Escape vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 08 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.5::el8
cpe:/a:redhat:acm:2.6::el8
cpe:/a:redhat:multicluster_engine:2.0::el8
cpe:/a:redhat:multicluster_engine:2.1::el8

Mon, 19 Aug 2024 22:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:acm:2.5::el8
cpe:/a:redhat:acm:2.6::el8
cpe:/a:redhat:multicluster_engine:2.0::el8
cpe:/a:redhat:multicluster_engine:2.1::el8

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-01-22T21:42:31.793Z

Reserved: 2023-05-08T13:26:03.878Z

Link: CVE-2023-32314

cve-icon Vulnrichment

Updated: 2024-08-02T15:10:24.942Z

cve-icon NVD

Status : Modified

Published: 2023-05-15T20:15:09.177

Modified: 2024-11-21T08:03:05.643

Link: CVE-2023-32314

cve-icon Redhat

Severity : Critical

Publid Date: 2023-05-15T00:00:00Z

Links: CVE-2023-32314 - Bugzilla

cve-icon OpenCVE Enrichment

No data.