{"id":"CVE-2024-23682","details":"Artemis Java Test Sandbox versions before 1.8.0 are vulnerable to a sandbox escape when an attacker includes class files in a package that Ares trusts. An attacker can abuse this issue to execute arbitrary Java when a victim executes the supposedly sandboxed code.","aliases":["GHSA-227w-wv4j-67h4"],"modified":"2026-03-15T22:41:48.724722Z","published":"2024-01-19T21:15:10.273Z","related":["GHSA-227w-wv4j-67h4"],"references":[{"type":"ADVISORY","url":"https://github.com/ls1intum/Ares/releases/tag/1.8.0"},{"type":"ADVISORY","url":"https://vulncheck.com/advisories/vc-advisory-GHSA-227w-wv4j-67h4"},{"type":"REPORT","url":"https://github.com/ls1intum/Ares/issues/15"},{"type":"EVIDENCE","url":"https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4"},{"type":"EVIDENCE","url":"https://github.com/advisories/GHSA-227w-wv4j-67h4"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ls1intum/ares","events":[{"introduced":"0"},{"fixed":"30da71893a42c2bd69fea885934f96d4a1792c49"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"1.8.0"}]}}],"versions":["0.1.0","0.1.1","0.1.2","0.1.3","0.2.0","0.2.1","0.2.10","0.2.11","0.2.2","0.2.3","0.2.4","0.2.5","0.2.6","0.2.7","0.2.8","0.2.9","0.3.0","0.3.1","0.3.10","0.3.2","0.3.3","0.3.4","0.3.5","0.3.6","0.3.7","0.3.8","0.3.9","0.4.0","0.4.1","0.4.2","0.4.3","0.4.4","0.4.5","0.4.6","0.5.0","0.5.1","0.5.2","1.0.0","1.0.1","1.1.0","1.1.1","1.2.0","1.2.1","1.2.2","1.3.0","1.3.1","1.3.2","1.3.3","1.3.4","1.4.0","1.4.1","1.4.2","1.4.3","1.4.4","1.4.5","1.4.6","1.4.7","1.5.0","1.5.1","1.5.2","1.5.3","1.5.4","1.5.5","1.6.0","1.7.0","1.7.1","1.7.2","1.7.3","1.7.4","1.7.5","1.7.6"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-23682.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H"}]}