Sandbox Bypass Affecting lua package, versions [0,]


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.1% (29th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-LUA-2428286
  • published17 Mar 2022
  • disclosed17 Mar 2022
  • creditUnknown

Introduced: 17 Mar 2022

CVE-2021-44964  (opens in a new tab)
CWE-265  (opens in a new tab)

How to fix?

There is no fixed version for lua.

Overview

Affected versions of this package are vulnerable to Sandbox Bypass by exploiting a use after free vulnerability in the garbage collector and finalizer of lgc.c in the Lua interpreter, allowing the escape by using a crafted script file. The script file uses the use after free vulnerability to allow tcache bin poisoning which can change the address of the next chunk in tcache bin. With that, a chunk at __free_hook is being allocated and the address of the system function is written in it, leading to a /bin/sh shell.

CVSS Base Scores

version 3.1