Node.js Module vm2 < 3.9.16 Sandbox Breakout

critical Nessus Plugin ID 181412

Synopsis

A module in the Node.js JavaScript run-time environment is affected by a sandbox breakout vulnerability.

Description

There exists a vulnerability in source code transformer (exception sanitization logic) of vm2 for versions up to 3.9.15, allowing attackers to bypass `handleException()` and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context. A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to vm2 version 3.9.16 or later.

See Also

https://github.com/patriksimek/vm2/issues/516

http://www.nessus.org/u?7d0ad37c

Plugin Details

Severity: Critical

ID: 181412

File Name: nodejs_module_vm2_3_9_16.nasl

Version: 1.1

Type: local

Agent: windows

Family: Misc.

Published: 9/14/2023

Updated: 9/15/2023

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-29199

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vm2_project:vm2

Required KB Items: installed_sw/Node.js

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/11/2023

Vulnerability Publication Date: 4/11/2023

Reference Information

CVE: CVE-2023-29199