logo

CVE-2019-10769 safer-eval

Package

Manager: npm
Name: safer-eval
Vulnerable Version: >=0 <=1.3.6

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00525 pctl0.6605

Details

Sandbox Breakout / Arbitrary Code Execution in safer-eval All versions of `safer-eval` are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context and is not suited to process arbitrary user input. This may allow attackers to execute arbitrary code in the system. ## Recommendation The package is not meant to receive user input. Consider using an alternative package until a fix is made available.

Metadata

Created: 2019-12-11T02:01:44Z
Modified: 2021-07-28T16:43:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/12/GHSA-v63x-xc9j-hhvq/GHSA-v63x-xc9j-hhvq.json
CWE IDs: ["CWE-20", "CWE-94"]
Alternative ID: GHSA-v63x-xc9j-hhvq
Finding: F184
Auto approve: 1