First published: Mon May 15 2023(Updated: )
A flaw was found in the vm2. After making a vm, the inspect method is read-write for console.log, which allows an attacker to edit options for console.log. This issue impacts the integrity by changing the log subsystem.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/vm2 | <3.9.18 | 3.9.18 |
redhat/vm2 | <3.9.18 | 3.9.18 |
Vm2 Project | <3.9.18 |
After creating a vm, make the inspect method readonly with vm.readonly(inspect).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-32313 is classified as a medium severity vulnerability.
To fix CVE-2023-32313, upgrade vm2 to version 3.9.18 or later.
CVE-2023-32313 can compromise the integrity of your logging subsystem by allowing modification of console.log options.
CVE-2023-32313 affects vm2 versions 3.9.17 and lower.
The vm2 project related to CVE-2023-32313 is maintained by the vm2 Project.