You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Issue:
Npm library vm2 is vulnerable to sandbox escape resulting in remote code execution.
Description:
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. Prior to version 3.9.15, vm2 was not properly handling host objects passed to Error.prepareStackTrace in case of unhandled async errors.
In helix-front, vm2 is a child dependency of dependency proxy-agent.
Impact:
A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.
Issue:
Npm library vm2 is vulnerable to sandbox escape resulting in remote code execution.
Description:
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. Prior to version 3.9.15, vm2 was not properly handling host objects passed to
Error.prepareStackTrace
in case of unhandled async errors.In helix-front, vm2 is a child dependency of dependency proxy-agent.
Impact:
A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.
Recommendation:
References
GHSA-7jxr-cg7f-gpgv
https://nvd.nist.gov/vuln/detail/CVE-2023-29017
patriksimek/vm2#515
patriksimek/vm2@d534e57
https://gist.github.com/seongil-wi/2a44e082001b959bfe304b62121fb76d
The text was updated successfully, but these errors were encountered: