Description
The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
Remediation
References
https://github.com/hacksparrow/safe-eval/issues/5
https://github.com/patriksimek/vm2/issues/59
https://nodesecurity.io/advisories/337
Related Vulnerabilities
CVE-2019-16538 Vulnerability in maven package org.jenkins-ci.plugins:script-security
CVE-2018-9207 Vulnerability in maven package org.webjars:jquery-file-upload
CVE-2016-1000339 Vulnerability in maven package org.bouncycastle:bcprov-jdk15on
CVE-2016-7103 Vulnerability in maven package org.webjars.npm:jquery-ui
CVE-2022-36100 Vulnerability in maven package org.xwiki.platform:xwiki-platform-tag-ui