Description
The safe-eval module describes itself as a safer version of eval. By accessing the object constructors, un-sanitized user input can access the entire standard library and effectively break out of the sandbox.
Remediation
References
https://github.com/hacksparrow/safe-eval/issues/5
https://github.com/patriksimek/vm2/issues/59
https://nodesecurity.io/advisories/337
Related Vulnerabilities
CVE-2020-7792 Vulnerability in maven package org.webjars:mout
CVE-2022-43441 Vulnerability in npm package sqlite3
CVE-2022-32210 Vulnerability in maven package org.webjars.npm:undici
CVE-2022-25875 Vulnerability in maven package org.webjars.npm:svelte
CVE-2020-14340 Vulnerability in maven package org.jboss.xnio:xnio-api