THREATINT

We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Fathom (Privacy friendly web analytics)
Zendesk (Helpdesk and Chat)

Ok

Home | EN
Support
CVE
PUBLISHED

CVE-2024-28189

Judge0 vulnerable to Sandbox Escape Patch Bypass via chown running on Symbolic Link

AssignerGitHub_M
Reserved2024-03-06
Published2024-04-18
Updated2024-06-07

Description

Judge0 is an open-source online code execution system. The application uses the UNIX chown command on an untrusted file within the sandbox. An attacker can abuse this by creating a symbolic link (symlink) to a file outside the sandbox, allowing the attacker to run chown on arbitrary files outside of the sandbox. This vulnerability is not impactful on it's own, but it can be used to bypass the patch for CVE-2024-28185 and obtain a complete sandbox escape. This vulnerability is fixed in 1.13.1.



CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-61: UNIX Symbolic Link (Symlink) Following

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

<= 1.13.0
affected

References

https://github.com/judge0/judge0/security/advisories/GHSA-3xpw-36v7-2cmg

https://github.com/judge0/judge0/security/advisories/GHSA-h9g2-45c8-89cf

https://github.com/judge0/judge0/commit/f3b8547b3b67863e4ea0ded3adcb963add56addd

https://github.com/judge0/judge0/blob/v1.13.0/app/jobs/isolate_job.rb#L232

cve.org CVE-2024-28189

nvd.nist.gov CVE-2024-28189

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-28189
© Copyright 2024 THREATINT. Made in Cyprus with +