Description
The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
Remediation
References
https://github.com/hacksparrow/safe-eval/issues/5
https://github.com/patriksimek/vm2/issues/59
https://nodesecurity.io/advisories/337
Related Vulnerabilities
CVE-2017-5648 Vulnerability in maven package org.apache.tomcat:tomcat-catalina
CVE-2019-17563 Vulnerability in maven package org.apache.tomcat.embed:tomcat-embed-core
CVE-2018-20677 Vulnerability in npm package bootstrap
CVE-2016-5007 Vulnerability in maven package org.springframework.security:spring-security-config
CVE-2017-16125 Vulnerability in npm package rtcmulticonnection-client