CVE-2023-51661

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-51661
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-51661.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-51661
Aliases
Published
2023-12-22T15:15:08Z
Modified
2024-05-30T04:14:58.812436Z
Severity
  • 8.6 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Wasmer is a WebAssembly runtime that enables containers to run anywhere: from Desktop to the Cloud, Edge and even the browser. Wasm programs can access the filesystem outside of the sandbox. Service providers running untrusted Wasm code on Wasmer can unexpectedly expose the host filesystem. This vulnerability has been patched in version 4.2.4.

References

Affected packages

Git / github.com/wasmerio/wasmer

Affected ranges

Type
GIT
Repo
https://github.com/wasmerio/wasmer
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.1.0
0.1.1
0.1.2
0.1.3
0.1.4
0.10.0
0.10.1
0.10.2
0.11.0
0.12.0
0.13.0
0.13.1
0.14.0
0.14.1
0.15.0
0.16.0
0.16.1
0.16.2
0.17.0
0.17.1
0.2.0
0.2.1
0.3.0
0.4.0
0.4.1
0.4.2
0.5.0
0.5.1
0.5.2
0.5.3
0.5.4
0.5.5
0.5.6
0.5.7
0.6.0
0.7.0
0.8.0
0.9.0

1.*

1.0.0
1.0.0-alpha02.0
1.0.0-alpha3
1.0.0-alpha4
1.0.0-alpha5
1.0.0-beta1
1.0.0-beta2
1.0.0-rc1
1.0.1
1.0.2

2.*

2.0.0
2.0.0-rc1
2.0.0-rc2
2.1.0
2.1.1
2.2.0
2.2.0-rc1
2.2.0-rc2
2.2.1
2.3.0

3.*

3.0.0-alpha
3.0.0-beta
3.0.0-beta.2

v3.*

v3.0.0
v3.0.0-rc.1
v3.0.0-rc.2
v3.0.0-rc.3
v3.0.0-rc.4
v3.0.1
v3.0.2
v3.1.0
v3.2.0
v3.2.0-alpha.1
v3.2.0-beta.1
v3.2.0-beta.2
v3.2.1
v3.3.0

v4.*

v4.0.0
v4.0.0-alpha.1
v4.0.0-beta.1
v4.0.0-beta.2
v4.0.0-beta.3
v4.1.0
v4.1.1
v4.1.2
v4.2.0
v4.2.1
v4.2.2
v4.2.3

Other

vmini-release-headless