描述
Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.
AI分析AI驱动
受影响产品
ls1intumartemis_java_test_sandbox
参考资料
- https://github.com/advisories/GHSA-227w-wv4j-67h4ExploitThird Party Advisory
- https://github.com/ls1intum/Ares/issues/15Issue Tracking
- https://github.com/ls1intum/Ares/releases/tag/1.8.0Release Notes
- https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4ExploitVendor Advisory
- https://vulncheck.com/advisories/vc-advisory-GHSA-227w-wv4j-67h4Third Party Advisory
- https://github.com/advisories/GHSA-227w-wv4j-67h4ExploitThird Party Advisory
- https://github.com/ls1intum/Ares/issues/15Issue Tracking
- https://github.com/ls1intum/Ares/releases/tag/1.8.0Release Notes
- https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4ExploitVendor Advisory
- https://vulncheck.com/advisories/vc-advisory-GHSA-227w-wv4j-67h4Third Party Advisory