Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS0yM3J4LTc5cjctNmNweM4AA4lq

Sandbox escape in Artemis Java Test Sandbox

Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.

Permalink: https://github.com/advisories/GHSA-23rx-79r7-6cpx
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS0yM3J4LTc5cjctNmNweM4AA4lq
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: 11 months ago
Updated: 10 months ago


CVSS Score: 8.3
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Identifiers: GHSA-23rx-79r7-6cpx, CVE-2024-23683
References: Repository: https://github.com/ls1intum/Ares
Blast Radius: 6.5

Affected Packages

maven:de.tum.in.ase:artemis-java-test-sandbox
Dependent packages: 0
Dependent repositories: 6
Downloads:
Affected Version Ranges: < 1.7.6
Fixed in: 1.7.6
All affected versions: 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.2.2, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 1.4.5, 1.4.6, 1.4.7, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.6.0, 1.7.0, 1.7.1, 1.7.2, 1.7.3, 1.7.5
All unaffected versions: 1.7.6, 1.8.0, 1.9.0, 1.9.1, 1.9.2, 1.10.0, 1.10.1, 1.11.0, 1.11.1, 1.11.2, 1.11.3, 1.12.0, 1.13.0