CVE-2023-32313: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
(updated )
vm2 is a sandbox that can run untrusted code with Node’s built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node inspect
method and edit options for console.log
. As a result a threat actor can edit options for the console.log
command. This vulnerability was patched in the release of version 3.9.18
of vm2
. Users are advised to upgrade. Users unable to upgrade may make the inspect
method readonly with vm.readonly(inspect)
after creating a vm.
References
- gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550
- github.com/advisories/GHSA-p5gc-c584-jj6v
- github.com/patriksimek/vm2/commit/5206ba25afd86ef547a2c9d48d46ca7a9e6ec238
- github.com/patriksimek/vm2/releases/tag/3.9.18
- github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v
- nvd.nist.gov/vuln/detail/CVE-2023-32313
Detect and mitigate CVE-2023-32313 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →