-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability manifests because Birdcage's sandboxing (via lock()) doesn't spawn a new process, leaving the original process's environment variables in /proc/self/environ. The PoC shows environment variables are still readable via procfs after locking, indicating the sandboxing implementation in lock() lacks process isolation. The suggested fix to 'always spawn a new process' implies the vulnerability stems from how lock() handles process creation and environment isolation.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| birdcage | rust | < 0.7.0 | 0.7.0 |
Ongoing coverage of React2Shell