isolated-vm@1.5.1 vulnerabilities

Access to multiple isolates

  • latest version

    5.0.2

  • latest non vulnerable version

  • first published

    7 years ago

  • latest version published

    3 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the isolated-vm package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Remote Code Execution (RCE)

    isolated-vm is an Access to multiple isolates

    Affected versions of this package are vulnerable to Remote Code Execution (RCE) when untrusted v8 cached data is passed to the API through CachedDataOptions, by allowing attackers to bypass the sandbox and run arbitrary code in the nodejs process.

    Note:

    This issue has been addressed by improving the documentation.

    ״CachedData contains compiled machine code. That means you should not accept cachedData payloads from a user, otherwise they may be able to run arbitrary code.״

    How to fix Remote Code Execution (RCE)?

    Upgrade isolated-vm to version 4.3.7 or higher.

    <4.3.7
    • H
    Privilege Escalation

    isolated-vm is an Access to multiple isolates

    Affected versions of this package are vulnerable to Privilege Escalation. Misuse of Reference and other transferable APIs may lead to access to nodejs isolate. Affected versions have API pitfalls which make it possible for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate.

    Reference objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a Reference instance to an attacker, they would be able to use it to acquire a Reference to the nodejs context's Function object.

    Similar application-specific attacks could be possible by modifying the local prototype of other API objects.

    Access to NativeModule objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API, this would allow for arbitrary code execution.

    How to fix Privilege Escalation?

    Upgrade isolated-vm to version 4.0.0 or higher.

    <4.0.0