All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation.
Exploiting this vulnerability might result in remote code execution ("RCE").
**Vulnerable functions:**
__defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(), valueOf().
References
Configurations
History
21 Nov 2024, 07:50
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce - Exploit, Third Party Advisory | |
References | () https://github.com/hacksparrow/safe-eval/issues/27 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/hacksparrow/safe-eval/issues/31 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/hacksparrow/safe-eval/issues/32 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/hacksparrow/safe-eval/issues/33 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/hacksparrow/safe-eval/issues/34 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://github.com/hacksparrow/safe-eval/issues/35 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064 - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2023-04-11 05:15
Updated : 2024-11-21 07:50
NVD link : CVE-2023-26122
Mitre link : CVE-2023-26122
CVE.ORG link : CVE-2023-26122
JSON object : View
Products Affected
safe-eval_project
- safe-eval