CVE-2023-32313
May 15, 2023
vm2 is a sandbox that can run untrusted code with Node's built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node "inspect" method and edit options for "console.log". As a result a threat actor can edit options for the "console.log" command. This vulnerability was patched in the release of version "3.9.18" of "vm2". Users are advised to upgrade. Users unable to upgrade may make the "inspect" method readonly with "vm.readonly(inspect)" after creating a vm.
Affected Packages
vm2 (NPM):
Affected version(s) >=0.1.0 <3.9.18Fix Suggestion:
Update to version 3.9.18Related Resources (6)
Do you need more information?
Contact UsCVSS v4
Base Score:
6.9
Attack Vector
NETWORK
Attack Complexity
LOW
Attack Requirements
NONE
Privileges Required
NONE
User Interaction
NONE
Vulnerable System Confidentiality
NONE
Vulnerable System Integrity
LOW
Vulnerable System Availability
NONE
Subsequent System Confidentiality
NONE
Subsequent System Integrity
NONE
Subsequent System Availability
NONE
CVSS v3
Base Score:
5.3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
NONE
Integrity
LOW
Availability
NONE
Weakness Type (CWE)
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
EPSS
Base Score:
0.57