Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS03OXhmLTY3cjQtcTJqas4AAyqY

safe-eval vulnerable to Sandbox Bypass due to improper input sanitization

All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution (RCE).

Vulnerable functions:

defineGetter, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().

Permalink: https://github.com/advisories/GHSA-79xf-67r4-q2jj
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03OXhmLTY3cjQtcTJqas4AAyqY
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 1 year ago
Updated: about 1 year ago


CVSS Score: 10.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Identifiers: GHSA-79xf-67r4-q2jj, CVE-2023-26122
References: Repository: https://github.com/hacksparrow/safe-eval
Blast Radius: 34.4

Affected Packages

npm:safe-eval
Dependent packages: 264
Dependent repositories: 2,730
Downloads: 108,661 last month
Affected Version Ranges: <= 0.4.2
No known fixed version
All affected versions: 0.0.0, 0.1.0, 0.2.0, 0.3.0, 0.4.0, 0.4.1