Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNncGMtdzIzYy13NTl3
Sandbox Breakout / Arbitrary Code Execution in pitboss-ng
All versions of pitboss-ng
are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through this.constructor.constructor
. This may allow attackers to execute arbitrary code in the system. Evaluating the payload this.constructor.constructor('return process.env')()
prints the contents of process.env
.
Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
Permalink: https://github.com/advisories/GHSA-3gpc-w23c-w59wJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTNncGMtdzIzYy13NTl3
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 3 years ago
Updated: over 1 year ago
Identifiers: GHSA-3gpc-w23c-w59w
References: Blast Radius: 0.0
Affected Packages
npm:pitboss-ng
Dependent packages: 7Dependent repositories: 47
Downloads: 1,124 last month
Affected Version Ranges: < 2.0.0
Fixed in: 2.0.0
All affected versions: 0.2.1, 0.3.0, 0.3.1, 0.3.2, 0.3.3, 1.0.0, 1.1.0
All unaffected versions: 2.0.0, 2.0.1