As per sources, a security researcher released another proof-of-concept exploit for a sandbox escape vulnerability reported in the VM2 library, which allows the execution of unsafe code on the host running the VM2 sandbox. VM2 is a JavaScript sandbox to test and run untrusted code in an isolated environment, preventing access to the host's system resources or data. The VM2 library is used by a variety of pen-testing frameworks, integrated development environments, code editors, and security tools. In the past two weeks, various security researchers have discovered several critical sandbox escape flaws in the VM2 sandbox. At first, security researcher Seongil Wi discovered the sandbox escape flaw tracked as CVE-2023-29017, while another security analyst SeungHyun Lee discovered two flaws tracked as CVE-2023-29199 and CVE-2023-30547 within those weeks. From the above, the latest vulnerability is 'CVE-2023-30547', which is an exception sanitization flaw, allowing attackers to raise unsanitized host exceptions in the 'handleException()'. This function is to sanitize exceptions within the sandbox in order to prevent the leaking of any host information. However, if the hacker managed to set up a custom 'getPrototypeOf' proxy handler that throws an unsanitized host exception, the 'handleException' function will fail to sanitize it. This facilitates the attacker to get access to the host function (escaping the sandbox restrictions) and allows to perform arbitrary code execution in the host context, opening the way for potentially serious attacks. The CVE-2023-30547 vulnerability impacts all library versions from 3.9.16 and earlier. Security researcher SeungHyun Lee published the proof-of-concept exploit for sandbox escape flaw on a GitHub repository to show the feasibility of the attack, which created a filename 'pwned' on the target machine.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...