isolated-vm@1.7.1 vulnerabilities

Access to multiple isolates

Direct Vulnerabilities

Known vulnerabilities in the isolated-vm package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Remote Code Execution (RCE)

isolated-vm is an Access to multiple isolates

Affected versions of this package are vulnerable to Remote Code Execution (RCE) when untrusted v8 cached data is passed to the API through CachedDataOptions, by allowing attackers to bypass the sandbox and run arbitrary code in the nodejs process.

Note:

This issue has been addressed by improving the documentation.

How to fix Remote Code Execution (RCE)?

Upgrade isolated-vm to version 4.3.7 or higher.

<4.3.7
  • H
Privilege Escalation

isolated-vm is an Access to multiple isolates

Affected versions of this package are vulnerable to Privilege Escalation. Misuse of Reference and other transferable APIs may lead to access to nodejs isolate. Affected versions have API pitfalls which make it possible for implementers to expose supposed secure isolates to the permissions of the main nodejs isolate.

Reference objects allow access to the underlying reference's full prototype chain. In an environment where the implementer has exposed a Reference instance to an attacker, they would be able to use it to acquire a Reference to the nodejs context's Function object.

Similar application-specific attacks could be possible by modifying the local prototype of other API objects.

Access to NativeModule objects could allow an attacker to load and run native code from anywhere on the filesystem. If combined with, for example, a file upload API, this would allow for arbitrary code execution.

How to fix Privilege Escalation?

Upgrade isolated-vm to version 4.0.0 or higher.

<4.0.0