Sandbox Escaping Affecting safe-eval package, versions <0.4.0
Threat Intelligence
EPSS
0.28% (70th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID npm:safe-eval:20170830
- published 6 Sep 2017
- disclosed 30 Aug 2017
- credit Alessandro Nadalin
Introduced: 30 Aug 2017
CVE-2017-16088 Open this link in a new tabHow to fix?
Upgrade safe-eval
to version 0.4.0 or higher.
Overview
[safe-eval
] is a version of eval
, claiming to be safer.
Affected versions of this package are vulnerable to Sandbox Escaping. User input is not sanitized before being passed on to the safeEval function. A malicious user could access the object constructors, allowing access to the standard library, then escaping the sandbox.
Proof of Concept:
var safeEval = require('safe-eval');
safeEval("this.constructor.constructor('return process')().exit()");
References
CVSS Scores
version 3.1