Vulnerability identifier: #VU67205
Vulnerability risk: High
CVSSv4.0: 8.8 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Amber]
CVE-ID:
CWE-ID:
CWE-284
Exploitation vector: Network
Exploit availability: Yes
Vulnerable software:
vm2
Web applications /
Modules and components for CMS
Vendor: Patrik Simek
Description
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to improper access restrictions. A remote attacker can bypass the sandbox protections and execute arbitrary code on the host running the sandbox.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
vm2: 3.9.0 - 3.9.10
External links
https://github.com/patriksimek/vm2/commit/d9a7f3cc995d3d861e1380eafb886cb3c5e2b873#diff-b1a515a627d820118e76d0e323fe2f0589ed50a1eacb490f6c3278fe3698f164
https://github.com/patriksimek/vm2/issues/467
https://github.com/patriksimek/vm2/blob/master/lib/setup-sandbox.js#L71
https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.