First published: Fri Feb 11 2022(Updated: )
A flaw was found in vm2, where the sandbox can be bypassed via direct access to host error objects generated by node internals during the generation of stack traces. This flaw allows an attacker to execute arbitrary code on the host machine.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/vm2 | <3.9.6 | 3.9.6 |
Vm2 Project | <3.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23555 is considered critical due to its potential to allow arbitrary code execution on the host machine.
To fix CVE-2021-23555, update vm2 to version 3.9.6 or later.
CVE-2021-23555 affects all versions of the vm2 package prior to 3.9.6.
Yes, CVE-2021-23555 can potentially lead to data exposure by allowing unauthorized access to host resources.
There are no specific workarounds for CVE-2021-23555; upgrading to the patched version is recommended.