Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-28185— Judge0 vulnerable to Sandbox Escape via Symbolic Link

CVSS 10.0 · Critical EPSS 65.02% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-28185

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Judge0 vulnerable to Sandbox Escape via Symbolic Link
Source: NVD (National Vulnerability Database)
Vulnerability Description
Judge0 is an open-source online code execution system. The application does not account for symlinks placed inside the sandbox directory, which can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox. When executing a submission, Judge0 writes a `run_script` to the sandbox directory. The security issue is that an attacker can create a symbolic link (symlink) at the path `run_script` before this code is executed, resulting in the `f.write` writing to an arbitrary file on the unsandboxed system. An attacker can leverage this vulnerability to overwrite scripts on the system and gain code execution outside of the sandbox.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
CWE-61
Source: NVD (National Vulnerability Database)
Vulnerability Title
Judge0 CE 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Judge0 CE是Judge0开源的一个开源在线代码执行系统。 Judge0 CE 1.13.1之前版本存在安全漏洞,该漏洞源于应用程序不考虑放置在沙箱目录内的符号链接,攻击者利用该漏洞可以使用该符号链接写入任意文件并在沙箱外执行代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
judge0judge0 <= 1.13.0 -

II. Public POCs for CVE-2024-28185

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-28185

登录查看更多情报信息。

Same Patch Batch · judge0 · 2024-04-18 · 3 CVEs total

CVE-2024-2818910.0 CRITICALJudge0 vulnerable to Sandbox Escape Patch Bypass via chown running on Symbolic Link
CVE-2024-290219.1 CRITICALSSRF into Sandbox Escape through Unsafe Default Configuration

IV. Related Vulnerabilities

V. Comments for CVE-2024-28185

No comments yet


Leave a comment