Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpwOTktNWg4dy1nbXhj
Sandbox Breakout / Arbitrary Code Execution in @zhaoyao91/eval-in-vm
All versions of @zhaoyao91/eval-in-vm
are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through this.constructor.constructor
. This may allow attackers to execute arbitrary code in the system. Evaluating the payload this.constructor.constructor('return process.env')()
prints the contents of process.env
.
Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
Permalink: https://github.com/advisories/GHSA-jp99-5h8w-gmxcJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWpwOTktNWg4dy1nbXhj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 3 years ago
Updated: 9 months ago
Identifiers: GHSA-jp99-5h8w-gmxc
References:
Affected Packages
npm:@zhaoyao91/eval-in-vm
Versions: >= 0.0.0No known fixed version