
Cloud Vulnerability DB
A community-led vulnerabilities database
A security vulnerability was identified in js-sandbox affecting versions 0.1.6 and earlier. The vulnerability stems from the exposure of Deno.core.ops.op_panic to the JavaScript runtime in the base core, which was discovered on July 18, 2024, and officially issued on December 4, 2024. This vulnerability has been assigned the identifier GHSA-4mw5-2636-4535 and is classified as having moderate severity (GitHub Advisory, RustSec Advisory).
The vulnerability exists in the denocore implementation where Deno.core.ops.oppanic is exposed to the JavaScript runtime environment. When this function is called, it triggers a manual panic in the thread containing the runtime, effectively breaking the sandboxing mechanism that should contain and isolate the JavaScript execution environment (GitHub Issue).
The primary impact of this vulnerability is the potential for denial-of-service attacks, as it allows JavaScript code to force a panic in the runtime's containing thread. This breaks the intended sandboxing mechanism and can lead to thread termination (RustSec Advisory).
A workaround has been proposed that involves stubbing out the exposed op with the following code: Deno.core.ops.op_panic = (msg) => { throw new Error(msg) };. However, as of the latest reports, there are no officially patched versions available (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."