Sandbox Breakout / Arbitrary Code Execution in veval

2020-09-04T15:04:20
ID GHSA-54QM-37QR-W5WQ
Type github
Reporter GitHub Advisory Database
Modified 2020-09-04T15:04:20

Description

All versions of veval are vulnerable to Sandbox Escape leading to Remote Code Execution. The package fails to restrict access to the main context through this.constructor.constructor . This may allow attackers to execute arbitrary code in the system. Evaluating the payload this.constructor.constructor('return process.env')() prints the contents of process.env.

Recommendation

No fix is currently available. Consider using an alternative package until a fix is made available.