First published: Thu Jul 13 2023(Updated: )
In vm2 for versions up to 3.9.19, `Promise` handler sanitization can be bypassed, allowing attackers to escape the sandbox and run arbitrary code. ### Impact Remote Code Execution, assuming the attacker has arbitrary code execution primitive inside the context of vm2 sandbox. ### Patches None. ### Workarounds None. ### References PoC - https://gist.github.com/leesh3288/f693061e6523c97274ad5298eb2c74e9 ### For more information If you have any questions or comments about this advisory: - Open an issue in [VM2](https://github.com/patriksimek/vm2) Thanks to [Xion](https://twitter.com/0x10n) (SeungHyun Lee) of [KAIST Hacking Lab](https://kaist-hacking.github.io/) for disclosing this vulnerability.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/vm2 | <=3.9.19 | |
IBM Cognos Analytics | <=12.0.0-12.0.2 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP3 | |
Vm2 Project | <=3.9.19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37466 has a critical severity level due to the potential for remote code execution.
To fix CVE-2023-37466, you should upgrade vm2 to version 3.9.20 or later.
CVE-2023-37466 affects vm2 versions up to and including 3.9.19 used in various Node.js applications.
Yes, CVE-2023-37466 can potentially lead to data breaches as it allows attackers to execute arbitrary code in the system's context.
The responsibility lies with the developers or administrators of applications using the affected versions of vm2.