Description
The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
Remediation
References
https://github.com/hacksparrow/safe-eval/issues/5
https://github.com/patriksimek/vm2/issues/59
https://nodesecurity.io/advisories/337
Related Vulnerabilities
CVE-2021-43859 Vulnerability in maven package com.thoughtworks.xstream:xstream
CVE-2020-6464 Vulnerability in maven package org.webjars.npm:electron
CVE-2020-2135 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2022-29256 Vulnerability in npm package sharp
CVE-2017-12612 Vulnerability in maven package org.apache.spark:spark-core_2.11