Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNncGMtdzIzYy13NTl3

Sandbox Breakout / Arbitrary Code Execution in pitboss-ng

All versions of pitboss-ng are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through this.constructor.constructor . This may allow attackers to execute arbitrary code in the system. Evaluating the payload this.constructor.constructor('return process.env')() prints the contents of process.env.

Recommendation

No fix is currently available. Consider using an alternative package until a fix is made available.

Permalink: https://github.com/advisories/GHSA-3gpc-w23c-w59w
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNncGMtdzIzYy13NTl3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 3 years ago
Updated: over 1 year ago


Identifiers: GHSA-3gpc-w23c-w59w
References: Blast Radius: 0.0

Affected Packages

npm:pitboss-ng
Dependent packages: 7
Dependent repositories: 47
Downloads: 1,124 last month
Affected Version Ranges: < 2.0.0
Fixed in: 2.0.0
All affected versions: 0.2.1, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 1.0.0, 1.1.0
All unaffected versions: 2.0.0, 2.0.1