CVE-2023-29017
CRITICALvm2 <3.9.15 - RCE
Title source: llmDescription
vm2 is a sandbox that can run untrusted code with whitelisted Node's built-in modules. Prior to version 3.9.15, vm2 was not properly handling host objects passed to `Error.prepareStackTrace` in case of unhandled async errors. A threat actor could bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. This vulnerability was patched in the release of version 3.9.15 of vm2. There are no known workarounds.
Exploits (4)
nomisec
WORKING POC
2 stars
by timb-machine-mirrors · poc
https://github.com/timb-machine-mirrors/seongil-wi-CVE-2023-29017
github
WORKING POC
by GabrieleDattile · pythonpoc
https://github.com/GabrieleDattile/cve-pocs/tree/main/CVE/CVE-2023-29017
References (4)
Scores
CVSS v3
10.0
EPSS
0.7540
EPSS Percentile
98.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-913
Status
published
Products (2)
npm/vm2
0 - 3.9.15npm
vm2_project/vm2
< 3.9.15
Published
Apr 06, 2023
Tracked Since
Feb 18, 2026