Cohere AI Terrarium Sandbox Flaw Enables Root Code Execution, Container Escape
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内,并且不需要特定的开头。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是一个叫Terrarium的Python沙盒发现了一个严重的安全漏洞,编号CVE-2026-5752,CVSS评分9.3。这个漏洞允许攻击者通过JavaScript原型链遍历逃逸沙盒,以root权限执行任意代码。Terrarium由Cohere AI开发,基于Pyodide运行,作为Docker容器使用。由于项目不再维护,漏洞可能无法修复。CERT/CC建议采取一些缓解措施。 接下来,我需要将这些关键点浓缩到100字以内。重点包括:漏洞名称、影响、评分、攻击方式、项目背景、维护状态以及建议措施。 最后,确保语言简洁明了,直接描述内容,不使用任何开头语。 </think> Python沙盒Terrarium被发现严重漏洞CVE-2026-5752(CVSS 9.3),允许攻击者通过JavaScript原型链遍历逃逸沙盒并以root权限执行任意代码。该漏洞源于Pyodide环境中的原型链遍历问题。由于项目已不再维护,修复可能性较低。建议用户采取网络分段、部署防火墙等措施缓解风险。 2026-4-22 07:16:0 Author: thehackernews.com(查看原文) 阅读量:16 收藏

Vulnerability / Container Security

A critical security vulnerability has been disclosed in a Python-based sandbox called Terrarium that could result in arbitrary code execution.

The vulnerability, tracked as CVE-2026-5752, is rated 9.3 on the CVSS scoring system.

"Sandbox escape vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal," according to a description of the flaw in CVE.org.

Developed by Cohere AI as an open-source project, Terrarium is a Python sandbox that's used as a Docker-deployed container for running untrusted code written by users or generated with assistance from a large language model (LLM).

Notably, Terrarium runs on Pyodide, a Python distribution for the browser and Node.js, enabling it to support standard Python packages.  The project has been forked 56 times and starred 312 times.

According to the CERT Coordination Center (CERT/CC), the root cause relates to a JavaScript prototype chain traversal in the Pyodide WebAssembly environment that enables code execution with elevated privileges on the host Node.js process.

Successful exploitation of the vulnerability can allow an attacker to break out of the confines of the sandbox and execute arbitrary system commands as root within the container.

In addition, it can permit unauthorized access to sensitive files, such as "/etc/passwd," reach other services on the container's network, and even possibly escape the container and escalate privileges further.

It bears noting that the attack requires local access to the system but does not require any user interaction or special privileges to exploit.

Security researcher Jeremy Brown has been credited with discovering and reporting the flaw. Given that the project is no longer actively maintained, the vulnerability is unlikely to be patched.

As mitigations, CERT/CC is advising users to take the following steps -

  • Disable features that allow users to submit code to the sandbox, if possible.
  • Segment the network to limit the attack surface and prevent lateral movement.
  • Deploy a Web Application Firewall to detect and block suspicious traffic, including attempts to exploit the vulnerability.
  • Monitor container activity for signs of suspicious behavior.
  • Limit access to the container and its resources to authorized personnel only.
  • Use a secure container orchestration tool to manage and secure containers.
  • Ensure that dependencies are up-to-date and patched.

"The sandbox fails to adequately prevent access to parent or global object prototypes, allowing sandboxed code to reference and manipulate objects in the host environment," SentinelOne said. "This prototype pollution or traversal technique bypasses the intended security boundaries of the sandbox."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/cohere-ai-terrarium-sandbox-flaw.html
如有侵权请联系:admin#unsafe.sh