GHSA-4vmm-mhcq-4x9j

Suggest an improvement
Source
https://github.com/advisories/GHSA-4vmm-mhcq-4x9j
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/06/GHSA-4vmm-mhcq-4x9j/GHSA-4vmm-mhcq-4x9j.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4vmm-mhcq-4x9j
Published
2019-06-14T16:15:14Z
Modified
2021-08-16T16:06:38Z
Severity
  • CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
Summary
Sandbox Bypass Leading to Arbitrary Code Execution in constantinople
Details

Versions of constantinople prior to 3.1.1 are vulnerable to a sandbox bypass which can lead to arbitrary code execution.

Recommendation

Update to version 3.1.1 or later.

References

Affected packages

npm / constantinople

Package

Name
constantinople
Purl
pkg:npm/constantinople

Affected ranges

Type
SEMVER
Events
Introduced
0The exact introduced commit is unknown
Fixed
3.1.1