Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-28189 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Judge0 CE allows attackers to escape the sandbox via symbolic links. πŸ“‰ **Consequences**: Arbitrary code execution outside the isolated environment. Total loss of isolation integrity.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-61**: Symbolic Link Following. πŸ› **Flaw**: The app uses UNIX commands on untrusted files inside the sandbox. It fails to prevent creating links to external files.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: Judge0 CE (Open Source Online Code Execution System). πŸ“… **Affected**: Versions **before 1.13.1**. 🏒 **Vendor**: Judge0.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: Execute code **outside** the sandbox. πŸ“‚ **Data**: Access/Modify files outside the restricted directory. ⚠️ **Impact**: High (CVSS 9.8). Full system compromise possible.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Auth**: None required (PR:N). 🌐 **Network**: Remote (AV:N). 🎯 **Complexity**: Low (AC:L). πŸš€ **Threshold**: **LOW**. Easy to exploit remotely without credentials.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exp**: No specific PoC code in data. πŸ” **References**: GitHub commits & Security Advisories (GHSA) are public. ⚠️ **Status**: Theoretical/Conceptual exploitation is clear, but wild exploit scripts not listed.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Verify your Judge0 CE version. 🚫 **Flag**: If version < 1.13.1, you are vulnerable. πŸ“‚ **Scan**: Look for usage of UNIX commands on untrusted sandbox files in `isolate_job.rb`.

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. πŸ“Œ **Patch**: Upgrade to **v1.13.1** or later. πŸ”— **Source**: See GitHub commit `f3b8547` and GHSA advisories for official fixes.

Q9What if no patch? (Workaround)

πŸ›‘ **Workaround**: If you cannot upgrade, **disable** the code execution feature for untrusted users. 🚫 **Mitigation**: Strictly validate file paths and prevent symlink creation in the sandbox environment.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **CRITICAL**. 🚨 **Priority**: Patch immediately. Remote code execution with no auth is a top-tier threat. Do not ignore this CVE.