CVE-2023-29017:
vm2 vulnerable to sandbox escape
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99038%
CWE
Published
4/7/2023
Updated
4/7/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
vm2 | npm | < 3.9.15 | 3.9.15 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the Error.prepareStackTrace
handler in setup-sandbox.js
. The commit diff shows critical changes to the stack trace processing logic where host CallSite
objects were not properly wrapped when passed through prepareStackTrace
. The PoC demonstrates exploitation via frames.constructor.constructor()
chain, which works because the frames
array contained raw host CallSite
objects. The patch adds proper wrapping through ensureThis()
and sandboxSst
handling, confirming this was the vulnerable path.