CVE-2022-39266 (GCVE-0-2022-39266)
Vulnerability from cvelistv5
Published
2022-09-29 18:10
Modified
2025-04-23 16:53
Severity ?
VLAI Severity ?
EPSS score ?
Summary
isolated-vm is a library for nodejs which gives the user access to v8's Isolate interface. In versions 4.3.6 and prior, if the untrusted v8 cached data is passed to the API through CachedDataOptions, attackers can bypass the sandbox and run arbitrary code in the nodejs process. Version 4.3.7 changes the documentation to warn users that they should not accept `cachedData` payloads from a user.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
laverdet | isolated-vm |
Version: <= 4.3.6 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:00:43.532Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv" }, { "name": "https://github.com/laverdet/isolated-vm/issues/379", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/laverdet/isolated-vm/issues/379" }, { "name": "https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8" }, { "name": "https://github.com/laverdet/isolated-vm/commits/v4.3.7", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/laverdet/isolated-vm/commits/v4.3.7" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-39266", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-23T15:48:39.661159Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-23T16:53:54.194Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "isolated-vm", "vendor": "laverdet", "versions": [ { "status": "affected", "version": "\u003c= 4.3.6" } ] } ], "descriptions": [ { "lang": "en", "value": "isolated-vm is a library for nodejs which gives the user access to v8\u0027s Isolate interface. In versions 4.3.6 and prior, if the untrusted v8 cached data is passed to the API through CachedDataOptions, attackers can bypass the sandbox and run arbitrary code in the nodejs process. Version 4.3.7 changes the documentation to warn users that they should not accept `cachedData` payloads from a user." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.7, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693: Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-24T22:24:52.829Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv" }, { "name": "https://github.com/laverdet/isolated-vm/issues/379", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/laverdet/isolated-vm/issues/379" }, { "name": "https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8" }, { "name": "https://github.com/laverdet/isolated-vm/commits/v4.3.7", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/laverdet/isolated-vm/commits/v4.3.7" } ], "source": { "advisory": "GHSA-2jjq-x548-rhpv", "discovery": "UNKNOWN" }, "title": "isolated-vm has vulnerable CachedDataOptions in API" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-39266", "datePublished": "2022-09-29T18:10:08.000Z", "dateReserved": "2022-09-02T00:00:00.000Z", "dateUpdated": "2025-04-23T16:53:54.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-39266\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2022-09-29T18:15:10.227\",\"lastModified\":\"2024-11-21T07:17:54.977\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"isolated-vm is a library for nodejs which gives the user access to v8\u0027s Isolate interface. In versions 4.3.6 and prior, if the untrusted v8 cached data is passed to the API through CachedDataOptions, attackers can bypass the sandbox and run arbitrary code in the nodejs process. Version 4.3.7 changes the documentation to warn users that they should not accept `cachedData` payloads from a user.\"},{\"lang\":\"es\",\"value\":\"isolated-vm es una biblioteca para nodejs que da acceso a la interfaz Isolate de v8. En versiones 4.3.6 y anteriores, si los datos en cach\u00e9 de v8 que no son confiables son pasados a la API mediante CachedDataOptions, los atacantes pueden omitir el sandbox y ejecutar c\u00f3digo arbitrario en el proceso de nodejs. En el momento de la publicaci\u00f3n, no son conocidas versiones corregidas ni mitigaciones\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.6,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-693\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:isolated-vm_project:isolated-vm:*:*:*:*:*:node.js:*:*\",\"versionEndIncluding\":\"4.3.6\",\"matchCriteriaId\":\"85E8608D-5CD0-4BE5-A9F0-230492B48439\"}]}]}],\"references\":[{\"url\":\"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/laverdet/isolated-vm/commits/v4.3.7\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/laverdet/isolated-vm/issues/379\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/laverdet/isolated-vm/commits/v4.3.7\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/laverdet/isolated-vm/issues/379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv\", \"name\": \"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/laverdet/isolated-vm/issues/379\", \"name\": \"https://github.com/laverdet/isolated-vm/issues/379\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8\", \"name\": \"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://github.com/laverdet/isolated-vm/commits/v4.3.7\", \"name\": \"https://github.com/laverdet/isolated-vm/commits/v4.3.7\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T12:00:43.532Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-39266\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-23T15:48:39.661159Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-23T15:48:42.105Z\"}}], \"cna\": {\"title\": \"isolated-vm has vulnerable CachedDataOptions in API\", \"source\": {\"advisory\": \"GHSA-2jjq-x548-rhpv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.7, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"laverdet\", \"product\": \"isolated-vm\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c= 4.3.6\"}]}], \"references\": [{\"url\": \"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv\", \"name\": \"https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/laverdet/isolated-vm/issues/379\", \"name\": \"https://github.com/laverdet/isolated-vm/issues/379\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8\", \"name\": \"https://github.com/laverdet/isolated-vm/commit/218e87a6d4e8cb818bea76d1ab30cd0be51920e8\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/laverdet/isolated-vm/commits/v4.3.7\", \"name\": \"https://github.com/laverdet/isolated-vm/commits/v4.3.7\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"isolated-vm is a library for nodejs which gives the user access to v8\u0027s Isolate interface. In versions 4.3.6 and prior, if the untrusted v8 cached data is passed to the API through CachedDataOptions, attackers can bypass the sandbox and run arbitrary code in the nodejs process. Version 4.3.7 changes the documentation to warn users that they should not accept `cachedData` payloads from a user.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-693\", \"description\": \"CWE-693: Protection Mechanism Failure\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20: Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-08-24T22:24:52.829Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2022-39266\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-23T16:53:54.194Z\", \"dateReserved\": \"2022-09-02T00:00:00.000Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2022-09-29T18:10:08.000Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…