Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Demo5 #5

Closed
wants to merge 5 commits into from
Closed

Demo5 #5

wants to merge 5 commits into from

Conversation

jkylekelly
Copy link
Owner

Description

A clear and concise summary of the change and which issue (if any) it fixes. Should also include relevant motivation and context.

Resolved or fixed issue:

Affirmation

@@ -731,6 +731,8 @@ async function createOrders () {
const script = new VMScript(createOrders);
try {
const result = vm.run(script);
const result = vm.run(script);
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk: vm2 versions before 3.9.16 are vulnerable to Improper Control Of Dynamically-Managed Code Resources allowing attackers to bypass handleException() and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context.

Fix: Upgrade this library to at least version 3.9.16 at JS-App/package-lock.json:67635.

Reference(s): GHSA-xj72-wvfv-8985, CVE-2023-29199

Ignore this finding from ssc-d68b627b-18e0-4a15-892f-4ad0052bbd9a.

@@ -731,6 +731,8 @@ async function createOrders () {
const script = new VMScript(createOrders);
try {
const result = vm.run(script);
const result = vm.run(script);
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Risk: The package vm2 3.x before 3.9.11 is vulnerable to a sandbox bypass which enables arbitrary code to run out of the sandbox context, leading to execution on the host machine. It is recommended to upgrade to vm2 3.9.11.

Fix: Upgrade this library to at least version 3.9.11 at JS-App/package-lock.json:67635.

Reference(s): GHSA-mrgp-mrhc-5jrq, CVE-2022-36067

Ignore this finding from ssc-4035c22a-c2c2-4a3a-9bdf-5fa36b0bb1ce.

@jkylekelly jkylekelly closed this Dec 7, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant