Skip to content

Directus affected by VM2 sandbox escape vulnerability

High severity GitHub Reviewed Published Sep 14, 2023 in directus/directus • Updated Sep 18, 2023

Package

npm directus (npm)

Affected versions

< 10.6.0

Patched versions

10.6.0

Description

Impact

In vm2 for versions up to 3.9.19, Promise handler sanitization can be bypassed, allowing attackers to escape the sandbox and run arbitrary code. Within Directus this applies to the "Run Script" operation in flows being able to escape the sandbox running code in the main nodejs context.

Patches

Patched in v10.6.0 by replacing vm2 with isolated-vm

Workarounds

None

References

GHSA-cchq-frgv-rjh5

References

@br41nslug br41nslug published to directus/directus Sep 14, 2023
Published to the GitHub Advisory Database Sep 15, 2023
Reviewed Sep 15, 2023
Last updated Sep 18, 2023

Severity

High
7.7
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
High
User interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-22rr-f3p8-5gf8

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.