vm2 is a sandbox that can run untrusted code with whitelisted Nodes built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside handleException()
which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version 3.9.17
of vm2
. There are no known workarounds for this vulnerability. Users are advised to upgrade.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Vm2 | Vm2_project | * | 3.9.16 (including) |
Multicluster Engine for Kubernetes | RedHat | multicluster-engine-console-mce-container | * |
Multicluster Engine for Kubernetes | RedHat | multicluster-engine-console-mce-container | * |
Multicluster engine for Kubernetes 2.2 for RHEL 8 | RedHat | multicluster-engine/console-mce-rhel8:v2.2.3-13 | * |
Multicluster engine for Kubernetes 2.2 for RHEL 8 | RedHat | multicluster-engine/multicluster-engine-console-mce-rhel8:v2.2.3-13 | * |
Red Hat Advanced Cluster Management for Kubernetes 2 | RedHat | console-container | * |
Red Hat Advanced Cluster Management for Kubernetes 2 | RedHat | console-container | * |
Red Hat Advanced Cluster Management for Kubernetes 2.7 for RHEL 8 | RedHat | rhacm2/console-rhel8:v2.7.3-16 | * |