All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation. Exploiting this vulnerability might result in remote code execution ("RCE"). **Vulnerable functions:** __defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
Weaknesses in this category occur with improper handling, assignment, or management of privileges. A privilege is a property of an agent, such as a user. It lets the agent do things that are not ordinarily allowed. For example, there are privileges which allow an agent to perform maintenance functions such as restart a computer.
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object, but it does not properly control modifications of attributes of the object prototype.
Link | Tags |
---|---|
https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064 | third party advisory issue tracking exploit |
https://github.com/hacksparrow/safe-eval/issues/27 | third party advisory issue tracking exploit |
https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce | third party advisory exploit |
https://github.com/hacksparrow/safe-eval/issues/31 | third party advisory issue tracking exploit |
https://github.com/hacksparrow/safe-eval/issues/32 | third party advisory issue tracking exploit |
https://github.com/hacksparrow/safe-eval/issues/33 | third party advisory issue tracking exploit |
https://github.com/hacksparrow/safe-eval/issues/34 | third party advisory issue tracking exploit |
https://github.com/hacksparrow/safe-eval/issues/35 | third party advisory issue tracking exploit |