CVE-2017-16088

The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:safe-eval_project:safe-eval:0.0.0:*:*:*:*:node.js:*:*
cpe:2.3:a:safe-eval_project:safe-eval:0.1.0:*:*:*:*:node.js:*:*
cpe:2.3:a:safe-eval_project:safe-eval:0.2.0:*:*:*:*:node.js:*:*
cpe:2.3:a:safe-eval_project:safe-eval:0.3.0:*:*:*:*:node.js:*:*

History

21 Nov 2024, 03:15

Type Values Removed Values Added
References () https://github.com/hacksparrow/safe-eval/issues/5 - Third Party Advisory () https://github.com/hacksparrow/safe-eval/issues/5 - Third Party Advisory
References () https://github.com/patriksimek/vm2/issues/59 - Third Party Advisory () https://github.com/patriksimek/vm2/issues/59 - Third Party Advisory
References () https://nodesecurity.io/advisories/337 - Third Party Advisory () https://nodesecurity.io/advisories/337 - Third Party Advisory

Information

Published : 2018-06-07 02:29

Updated : 2024-11-21 03:15


NVD link : CVE-2017-16088

Mitre link : CVE-2017-16088

CVE.ORG link : CVE-2017-16088


JSON object : View

Products Affected

safe-eval_project

  • safe-eval
CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere

NVD-CWE-noinfo