Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. vm2
  4. ›
  5. CVE-2023-32313

CVE-2023-32313: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

May 15, 2023 (updated May 24, 2023)

vm2 is a sandbox that can run untrusted code with Node’s built-in modules. In versions 3.9.17 and lower of vm2 it was possible to get a read-write reference to the node inspect method and edit options for console.log. As a result a threat actor can edit options for the console.log command. This vulnerability was patched in the release of version 3.9.18 of vm2. Users are advised to upgrade. Users unable to upgrade may make the inspect method readonly with vm.readonly(inspect) after creating a vm.

References

  • gist.github.com/arkark/c1c57eaf3e0a649af1a70c2b93b17550
  • github.com/advisories/GHSA-p5gc-c584-jj6v
  • github.com/patriksimek/vm2/commit/5206ba25afd86ef547a2c9d48d46ca7a9e6ec238
  • github.com/patriksimek/vm2/releases/tag/3.9.18
  • github.com/patriksimek/vm2/security/advisories/GHSA-p5gc-c584-jj6v
  • nvd.nist.gov/vuln/detail/CVE-2023-32313

Code Behaviors & Features

Detect and mitigate CVE-2023-32313 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 3.9.18

Fixed versions

  • 3.9.18

Solution

Upgrade to version 3.9.18 or above.

Impact 5.3 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Learn more about CVSS

Source file

npm/vm2/CVE-2023-32313.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:01 +0000.