Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXIzeDQtd3I0aC1wdzMz
Sandbox Breakout / Arbitrary Code Execution in safer-eval
Versions of safer-eval
prior to 1.3.4 are vulnerable to Sandbox Escape leading to Remote Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code. For example, evaluating he string console.constructor.constructor('return process')().env
prints process.env
to the console.
Recommendation
Upgrade to version 1.3.4 or later.
Permalink: https://github.com/advisories/GHSA-r3x4-wr4h-pw33JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXIzeDQtd3I0aC1wdzMz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: about 5 years ago
Updated: almost 2 years ago
CVSS Score: 10.0
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Percentage: 0.00197
EPSS Percentile: 0.57522
Identifiers: GHSA-r3x4-wr4h-pw33, CVE-2019-10759
References:
- https://nvd.nist.gov/vuln/detail/CVE-2019-10759
- https://snyk.io/vuln/SNYK-JS-SAFEREVAL-173772
- https://www.npmjs.com/advisories/1021
- https://github.com/advisories/GHSA-r3x4-wr4h-pw33
Affected Packages
npm:safer-eval
Dependent packages: 24Dependent repositories: 17,794
Downloads: 42,178 last month
Affected Version Ranges: < 1.3.4
Fixed in: 1.3.4
All affected versions: 1.0.0, 1.0.1, 1.1.0, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.3.0, 1.3.1, 1.3.2, 1.3.3
All unaffected versions: 1.3.4, 1.3.5, 1.3.6