CVE-2024-28189

Improper Link Resolution Before File Access ('Link Following') (CWE-59)

Published: Apr 18, 2024 / Updated: 7mo ago

010
CVSS 10EPSS 0.05%Critical
CVE info copied to clipboard

Summary

Judge0 is an open-source online code execution system that allows an attacker to abuse the UNIX chown command on an untrusted file within the sandbox by creating a symbolic link (symlink) to a file outside the sandbox. This allows the attacker to run chown on arbitrary files outside the sandbox, bypassing the patch for CVE-2024-28185 and obtaining a complete sandbox escape. This vulnerability does not have a high impact on its own but enables further exploitation.

Impact

An attacker who exploits this vulnerability can gain elevated privileges and execute arbitrary code outside the intended sandbox environment. This could lead to complete system compromise and data theft/manipulation on the affected system.

Exploitation

There is no information provided about active exploitation or public proof-of-concepts for this vulnerability.

Patch

This vulnerability is fixed in Judge0 version 1.13.1 and later. Systems running earlier versions should be updated.

Mitigation

Apply the latest version 1.13.1 update from the vendor to patch this vulnerability. As an interim mitigation, restrict access to the Judge0 service to only trusted users and networks until patching can be performed.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Timeline

CVE Assignment

NVD published the first details for CVE-2024-28189

Apr 18, 2024 at 3:15 PM
CVSS

A CVSS base score of 10 has been assigned.

Apr 18, 2024 at 3:20 PM / nvd
First Article

Feedly found the first article mentioning CVE-2024-28189. See article

Apr 18, 2024 at 3:21 PM / VulDB Recent Entries
EPSS

EPSS Score was set to: 0.05% (Percentile: 14.2%)

Apr 19, 2024 at 10:02 AM
Threat Intelligence Report

The vulnerability CVE-2024-28189 in Judge0 allowed for a sandbox escape and root access on the host machine. It was patched after being reported, but a bypass was discovered shortly after. Proof of concepts and exploit scripts were released, posing a critical risk if exploited in the wild and potentially impacting other third-party vendors using Judge0. See article

Apr 29, 2024 at 6:57 AM
Static CVE Timeline Graph

Affected Systems

Bitdefender/box
+null more

Links to Mitre Att&cks

T1547.009: Shortcut Modification
+null more

Attack Patterns

CAPEC-132: Symlink Attack
+null more

References

Judge0 Sandbox Escape
Judge0 is an open source service used to run arbitrary code inside a secure sandbox. Tanto Security disclosed vulnerabilities in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine.
Judge0 Sandbox Escape
Although it is possible to execute code outside of the submission, it doesn’t help us as this is run inside the isolate sandbox. Tanto Security disclosed vulnerabilities in Judge0 that allows an adversary with sufficient access to perform a sandbox escape and obtain root permissions on the host machine.

News

Cyber Security News Weekly Round-Up Vulnerabilities & Threats | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware
In view of this weakness, the agency has declared immediate action such as patching up any vulnerable systems with updates from official sources while monitoring them closely among other recommended mitigations against potential attacks exploiting this vulnerability according to another report published by CISA, who also said we should use some methods like enhanced monitoring which may include logging and analysis tools. A state-sponsored threat actor called “UAT4356” has been identified as the group behind the ArcaneDoor campaign that exploited Cisco Firewall zero-days and targeted government perimeter network devices worldwide, according to an analysis of the report on ArcaneDoor hackers and their link to China.
Cyber Security News Weekly Round-Up (Vulnerabilities, Cyber Attacks, Threats & New Stories) - CybersecurityNews
In view of this weakness, the agency has declared immediate action such as patching up any vulnerable systems with updates from official sources while monitoring them closely among other recommended mitigations against potential attacks exploiting this vulnerability according to another report published by CISA, who also said we should use some methods like enhanced monitoring which may include logging and analysis tools. A state-sponsored threat actor called “UAT4356” has been identified as the group behind the ArcaneDoor campaign that exploited Cisco Firewall zero-days and targeted government perimeter network devices worldwide, according to an analysis of the report on ArcaneDoor hackers and their link to China.
InfoSec MASHUP - Week 18/2024
According to Dropbox, a threat actor gained access to the Sign production environment and accessed customer information, including email addresses, usernames, phone numbers, hashed passwords, data on general account settings, and authentication data such as API keys, OAuth tokens and multi-factor authentication. " The DPRK [Democratic People's Republic of Korea] leverages these spear-phishing campaigns to collect intelligence on geopolitical events, adversary foreign policy strategies, and any information affecting DPRK interests by gaining illicit access to targets' private documents, research, and communications, " NSA said .
May 3: Top Threat Actors, Malware, Vulnerabilities and Exploits
These vulnerabilities, namely CVE-2024-28185, CVE-2024-28189, and CVE-2024-29021, pose significant threats by enabling attackers to execute code outside the sandbox environment, escalate privileges, and ultimately gain full control over the Judge0 system. The CVE-2024-27322 (CVSS score of 8.8 ), vulnerability poses a severe threat to the security of the R programming language by permitting arbitrary code execution through the deserialization of untrusted data [1] .
Sandbox Escape Vulnerabilities in Judge0 Expose Systems to Complete Takeover
CVE-2024-28185 (CVSS score: 10.0) – The application does not account for symlinks placed inside the sandbox directory, which can be leveraged by an attacker to write to arbitrary files and gain code execution outside of the sandbox. A threat actor could leverage this flaw to overwrite scripts on the system and gain code execution outside of the sandbox and on the Docker container running the submission job.
See 36 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Changed
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI