Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-23rx-79r7-6cpx Sandbox escape in Artemis Java Test Sandbox
Github GHSA Github GHSA GHSA-883x-6fch-6wjx Trust Boundary Violation due to Incomplete Blacklist in Test Failure Processing in Ares
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 28 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
Description Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code. Artemis Java Test Sandbox versions less than 1.7.6 are vulnerable to a sandbox escape when an attacker crafts a special subclass of InvocationTargetException. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.

Fri, 20 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-653
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-11-28T16:29:14.849Z

Reserved: 2024-01-19T17:35:09.984Z

Link: CVE-2024-23683

cve-icon Vulnrichment

Updated: 2024-08-01T23:06:25.359Z

cve-icon NVD

Status : Modified

Published: 2024-01-19T21:15:10.340

Modified: 2025-11-28T17:16:07.980

Link: CVE-2024-23683

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses