Sandbox Breakout / Arbitrary Code Execution in safe-eval
Critical severity
GitHub Reviewed
Published
Aug 25, 2020
to the GitHub Advisory Database
•
Updated Sep 11, 2023
Description
Published by the National Vulnerability Database
Aug 21, 2020
Reviewed
Aug 25, 2020
Published to the GitHub Advisory Database
Aug 25, 2020
Last updated
Sep 11, 2023
All versions of
safe-eval
are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through Error objects. This may allow attackers to execute arbitrary code in the system.Evaluating the payload
prints the contents of
process.env
.Recommendation
No fix is currently available. Consider using an alternative package until a fix is made available.
References