static-eval@1.1.0 vulnerabilities

evaluate statically-analyzable expressions

  • latest version

    2.1.1

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    11 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the static-eval package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Arbitrary Code Execution

    static-eval evaluates statically-analyzable expressions.

    Affected versions of this package are vulnerable to Arbitrary Code Execution. It passes untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.

    How to fix Arbitrary Code Execution?

    Upgrade static-eval to version 2.0.2 or higher.

    <2.0.2
    • H
    Arbitrary Code Execution

    static-eval is a module to evaluate statically-analyzable expressions.

    Affected versions of the package are vulnerable to Arbitrary Code Execution. If un-sanitized user input is passed to static-eval, it is possible to break out of the sandboxed instance, and execute arbitrary code from the standard library.

    How to fix Arbitrary Code Execution?

    Upgrade static-eval to version 2.0.0 or higher.

    <2.0.0