CVE-2022-36067

critical

Description

vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. In versions prior to version 3.9.11, a threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.11 of vm2. There are no known workarounds.

References

https://www.oxeye.io/blog/vm2-sandbreak-vulnerability-cve-2022-36067

https://security.netapp.com/advisory/ntap-20221017-0002/

https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq

https://github.com/patriksimek/vm2/issues/467

https://github.com/patriksimek/vm2/commit/d9a7f3cc995d3d861e1380eafb886cb3c5e2b873#diff-b1a515a627d820118e76d0e323fe2f0589ed50a1eacb490f6c3278fe3698f164

https://github.com/patriksimek/vm2/blob/master/lib/setup-sandbox.js#L71

Details

Source: Mitre, NVD

Published: 2022-09-06

Updated: 2022-11-08

Risk Information

CVSS v2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Severity: Critical

CVSS v3

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Severity: Critical