Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-23rx-79r7-6cpx | Sandbox escape in Artemis Java Test Sandbox |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 20 Jun 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-653 | |
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2025-06-20T18:26:59.260Z
Reserved: 2024-01-19T17:35:09.984Z
Link: CVE-2024-23683
Updated: 2024-08-01T23:06:25.359Z
Status : Modified
Published: 2024-01-19T21:15:10.340
Modified: 2025-06-20T19:15:34.007
Link: CVE-2024-23683
No data.
OpenCVE Enrichment
No data.
Github GHSA