Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03OXhmLTY3cjQtcTJqas4AAyqY
safe-eval vulnerable to Sandbox Bypass due to improper input sanitization
All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution (RCE).
Vulnerable functions:
defineGetter, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
Permalink: https://github.com/advisories/GHSA-79xf-67r4-q2jjJSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03OXhmLTY3cjQtcTJqas4AAyqY
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 1 year ago
Updated: over 1 year ago
CVSS Score: 10.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Identifiers: GHSA-79xf-67r4-q2jj, CVE-2023-26122
References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-26122
- https://github.com/hacksparrow/safe-eval/issues/27
- https://github.com/hacksparrow/safe-eval/issues/31
- https://github.com/hacksparrow/safe-eval/issues/32
- https://github.com/hacksparrow/safe-eval/issues/33
- https://github.com/hacksparrow/safe-eval/issues/34
- https://github.com/hacksparrow/safe-eval/issues/35
- https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce
- https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064
- https://github.com/advisories/GHSA-79xf-67r4-q2jj
Blast Radius: 34.4
Affected Packages
npm:safe-eval
Dependent packages: 264Dependent repositories: 2,730
Downloads: 129,438 last month
Affected Version Ranges: <= 0.4.2
No known fixed version
All affected versions: 0.0.0, 0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.4.1