realms-shim@1.1.2 vulnerabilities
Spec-compliant shim for Realms TC39 Proposal
-
latest version
1.2.2
-
first published
5 years ago
-
latest version published
5 years ago
-
licenses detected
- >=0
Direct Vulnerabilities
Known vulnerabilities in the realms-shim package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.Vulnerability | Vulnerable Version |
---|---|
realms-shim is a shim implementation of the Realm API Proposal. Affected versions of this package are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector. PoC
How to fix Sandbox Bypass? There is no fixed version for |
*
|
realms-shim is a shim implementation of the Realm API Proposal. Affected versions of this package are vulnerable to Sandbox Bypass via a Prototype Pollution attack vector. PoC
How to fix Sandbox Bypass? There is no fixed version for |
*
|
realms-shim is a shim implementation of the Realm API Proposal. Affected versions of this package are vulnerable to Sandbox Breakout. The realms-shim is intended to provide a "safe evaluator" which executes arbitrary strings code with limited authority. This provides a "sandbox" which only has access to the specific objects and power that the caller chooses to expose. The A bug was found in the transformation pipeline that exposed a primal-Realm object to one of the transform functions. The confined code could use this to escape the sandbox and compromise the Realm which created it. This generally leads to a full compromise of the application. How to fix Sandbox Breakout? Upgrade |
<1.2.1
|
realms-shim is a shim implementation of the Realm API Proposal. Affected versions of this package are vulnerable to {{ affectedlibrary.vulnerability.title }}, which would allow the attacker to run arbitrary code. The vulnerable paths:
How to fix Sandbox Breakout? Upgrade |
<1.2.0
|