Sandbox Breakout / Arbitrary Code Execution in static-eval
Moderate severity
GitHub Reviewed
Published
Aug 6, 2018
to the GitHub Advisory Database
•
Updated Sep 11, 2023
Description
Published to the GitHub Advisory Database
Aug 6, 2018
Reviewed
Jun 16, 2020
Last updated
Sep 11, 2023
Affected versions of
static-eval
pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.Proof of concept
Recommendation
Update to version 2.0.0 or later.
References