Miggo Logo

GHSA-98hq-4wmw-98w9: Arbitrary code execution in de.tum.in.ase:artemis-java-test-sandbox

8.3

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
2/10/2023
Updated
2/24/2023
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
de.tum.in.ase:artemis-java-test-sandboxmaven< 1.11.21.11.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability arises because the custom SecurityManager in the sandbox does not override checkLink(String), which is required to restrict library loading. System.load and System.loadLibrary are standard Java methods that trigger checkLink checks. Without proper access control in checkLink, these methods allow students to load malicious native libraries containing arbitrary code. The advisory explicitly identifies these methods as the exploitation vectors, and their presence in student-accessible code makes them vulnerable entry points.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Summ*ry ****us* o* t** missin* `****kLink(Strin*)` ov*rri** in t** S**urityM*n***r, stu**nts **n lo** li*r*ri*s *n* *x**ut* *r*itr*ry *o**. ### **t*ils Usin* `Syst*m.lo**(Strin*)` or `Syst*m.lo**Li*r*ry​(Strin*)` stu**nts **n lo** *n* *x**ut* *r

Reasoning

T** vuln*r**ility *ris*s ****us* t** *ustom `S**urityM*n***r` in t** s*n**ox *o*s not ov*rri** `****kLink(Strin*)`, w*i** is r*quir** to r*stri*t li*r*ry lo**in*. `Syst*m.lo**` *n* `Syst*m.lo**Li*r*ry` *r* st*n**r* J*v* m*t*o*s t**t tri***r `****kLin