GHSA-79xf-67r4-q2jj

Suggest an improvement
Source
https://github.com/advisories/GHSA-79xf-67r4-q2jj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-79xf-67r4-q2jj/GHSA-79xf-67r4-q2jj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-79xf-67r4-q2jj
Aliases
Published
2023-04-11T06:30:29Z
Modified
2023-11-08T04:11:58.883105Z
Severity
  • 10.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
safe-eval vulnerable to Sandbox Bypass due to improper input sanitization
Details

All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution (RCE).

Vulnerable functions:

defineGetter, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().

Database specific
{
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-1321"
    ],
    "severity": "CRITICAL",
    "github_reviewed_at": "2023-04-11T15:27:27Z",
    "nvd_published_at": "2023-04-11T05:15:00Z"
}
References

Affected packages

npm / safe-eval

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
0.4.2