ses@0.15.2 vulnerabilities

Hardened JavaScript for Fearless Cooperation

  • latest version

    1.10.0

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    27 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the ses package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Improper Input Validation

    ses is a secure runtime for running third-party code safely.

    Affected versions of this package are vulnerable to Improper Input Validation. There is an issue in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host.

    Note:

    Guest programs running inside a Compartment with as few as no endowments can gain access to the surrounding host’s dynamic import by using dynamic import after the spread operator, like {...import(arbitraryModuleSpecifier)}.

    How to fix Improper Input Validation?

    Upgrade ses to version 0.13.5, 0.14.5, 0.15.24, 0.16.1, 0.17.1, 0.18.7 or higher.

    >=0.13.0 <0.13.5>=0.14.0 <0.14.5>=0.15.0 <0.15.24>=0.16.0 <0.16.1>=0.17.0 <0.17.1>=0.18.0 <0.18.7
    • L
    Improper Data Handling

    ses is a secure runtime for running third-party code safely.

    Affected versions of this package are vulnerable to Improper Data Handling due to a defect in harden properties which have names that parse as numbers but are not the same as the canonical representation of those numbers, as in "+0" and "" which are both equivalent to their canonical number "0", remain writable after hardening.

    How to fix Improper Data Handling?

    Upgrade ses to version 0.16.0 or higher.

    <0.16.0