Improper Link Resolution Before File Access ('Link Following') (CWE-59)
Judge0 is an open-source online code execution system that allows an attacker to abuse the UNIX chown command on an untrusted file within the sandbox by creating a symbolic link (symlink) to a file outside the sandbox. This allows the attacker to run chown on arbitrary files outside the sandbox, bypassing the patch for CVE-2024-28185 and obtaining a complete sandbox escape. This vulnerability does not have a high impact on its own but enables further exploitation.
An attacker who exploits this vulnerability can gain elevated privileges and execute arbitrary code outside the intended sandbox environment. This could lead to complete system compromise and data theft/manipulation on the affected system.
There is no information provided about active exploitation or public proof-of-concepts for this vulnerability.
This vulnerability is fixed in Judge0 version 1.13.1 and later. Systems running earlier versions should be updated.
Apply the latest version 1.13.1 update from the vendor to patch this vulnerability. As an interim mitigation, restrict access to the Judge0 service to only trusted users and networks until patching can be performed.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
NVD published the first details for CVE-2024-28189
A CVSS base score of 10 has been assigned.
Feedly found the first article mentioning CVE-2024-28189. See article
EPSS Score was set to: 0.05% (Percentile: 14.2%)
The vulnerability CVE-2024-28189 in Judge0 allowed for a sandbox escape and root access on the host machine. It was patched after being reported, but a bypass was discovered shortly after. Proof of concepts and exploit scripts were released, posing a critical risk if exploited in the wild and potentially impacting other third-party vendors using Judge0. See article