Exploit code: Malicious code could break out of JavaScript sandbox vm2

Attackers could quickly attack systems with the JavaScript sandbox vm2 and break out of the sandbox with malicious code. Recently published exploit code could serve as the basis for this.

With the vm2 library, developers run untrusted code in isolation on a Node.js server. The vm2 sandbox is widely used with millions of monthly downloads from the NPM repository.

Die „criticalThe vulnerability (CVE-2023-29017) is rated with the highest possible CVSS score of 10 out of 10. As a warning message states, when processing Hoste objects, it occurs in the context of the function Error.prepareStackTrace to bugs, allowing attackers to break out of the sandbox. They could then run their own code on the host system, completely compromising the computer.

The developers state that the gap in the vm2-Version 3.9.15 to have closed. All previous releases are supposed to be vulnerable.


(of the)

To home page

Related Posts

Hot News

Trending

usefull links

robis robis robis