vm2 is an advanced vm/sandbox for Node.js. The library contains critical security issues and should not be used for production. The maintenance of the project has been discontinued. In vm2 for versions up to 3.9.19, `Promise` handler sanitization can be bypassed with `@@species` accessor property allowing attackers to escape the sandbox and run arbitrary code. Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox.
References
| Link | Resource |
|---|---|
| https://github.com/patriksimek/vm2/security/advisories/GHSA-cchq-frgv-rjh5 | Vendor Advisory |
Configurations
Information
Published : 2023-07-14 00:15
Updated : 2023-07-27 12:15
NVD link : CVE-2023-37466
Mitre link : CVE-2023-37466
JSON object : View
Products Affected
vm2_project
- vm2
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
