Sandbox Breakout in safe-eval
Critical severity
GitHub Reviewed
Published
Jul 18, 2018
to the GitHub Advisory Database
•
Updated Sep 11, 2023
Description
Published to the GitHub Advisory Database
Jul 18, 2018
Reviewed
Jun 16, 2020
Last updated
Sep 11, 2023
Affected versions of
safe-eval
are vulnerable to a sandbox escape. By accessing object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.Proof of Concept:
This code accesses the process object and calls
.exit()
Recommendation
Update to version 0.4.0 or later
References