CVE Vulnerabilities

CVE-2023-30547

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Apr 17, 2023 | Modified: Nov 21, 2024
CVSS 3.x
10
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
root.io logo minimus.io logo echo.ai logo

vm2 is a sandbox that can run untrusted code with whitelisted Nodes built-in modules. There exists a vulnerability in exception sanitization of vm2 for versions up to 3.9.16, allowing attackers to raise an unsanitized host exception inside handleException() which can be used to escape the sandbox and run arbitrary code in host context. This vulnerability was patched in the release of version 3.9.17 of vm2. There are no known workarounds for this vulnerability. Users are advised to upgrade.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
Vm2Vm2_project*3.9.16 (including)
Multicluster Engine for KubernetesRedHatmulticluster-engine-console-mce-container*
Multicluster Engine for KubernetesRedHatmulticluster-engine-console-mce-container*
Multicluster engine for Kubernetes 2.2 for RHEL 8RedHatmulticluster-engine/console-mce-rhel8:v2.2.3-13*
Multicluster engine for Kubernetes 2.2 for RHEL 8RedHatmulticluster-engine/multicluster-engine-console-mce-rhel8:v2.2.3-13*
Red Hat Advanced Cluster Management for Kubernetes 2RedHatconsole-container*
Red Hat Advanced Cluster Management for Kubernetes 2RedHatconsole-container*
Red Hat Advanced Cluster Management for Kubernetes 2.7 for RHEL 8RedHatrhacm2/console-rhel8:v2.7.3-16*

Potential Mitigations

References