You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Arbitrary Code Execution vulnerability found in safer-eval versions 1.x through 1.3.6. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system.
WS-2020-0002 - Medium Severity Vulnerability
a safer eval
Library home page: https://registry.npmjs.org/safer-eval/-/safer-eval-1.3.5.tgz
Path to dependency file: /tmp/ws-scm/infinite/package.json
Path to vulnerable library: /tmp/ws-scm/infinite/node_modules/safer-eval/package.json
Dependency Hierarchy:
Found in HEAD commit: f686a0f9119ce1b31715bd19e5a2f4705af80098
Arbitrary Code Execution vulnerability found in safer-eval versions 1.x through 1.3.6. It is possible to escape the sandbox by forcing exceptions recursively in the evaluated code. This may allow attacker to execute arbitrary code in the system.
Publish Date: 2020-01-08
URL: WS-2020-0002
Base Score Metrics not available
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: