ses@0.13.3 vulnerabilities

Hardened JavaScript for Fearless Cooperation

Direct Vulnerabilities

Known vulnerabilities in the ses package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • C
Improper Input Validation

ses is a secure runtime for running third-party code safely.

Affected versions of this package are vulnerable to Improper Input Validation. There is an issue in the confinement of guest applications under SES that may manifest as either the ability to exfiltrate information or execute arbitrary code depending on the configuration and implementation of the surrounding host.

Note:

Guest programs running inside a Compartment with as few as no endowments can gain access to the surrounding host’s dynamic import by using dynamic import after the spread operator, like {...import(arbitraryModuleSpecifier)}.

How to fix Improper Input Validation?

Upgrade ses to version 0.13.5, 0.14.5, 0.15.24, 0.16.1, 0.17.1, 0.18.7 or higher.

>=0.13.0 <0.13.5 >=0.14.0 <0.14.5 >=0.15.0 <0.15.24 >=0.16.0 <0.16.1 >=0.17.0 <0.17.1 >=0.18.0 <0.18.7
  • L
Improper Data Handling

ses is a secure runtime for running third-party code safely.

Affected versions of this package are vulnerable to Improper Data Handling due to a defect in harden properties which have names that parse as numbers but are not the same as the canonical representation of those numbers, as in "+0" and "" which are both equivalent to their canonical number "0", remain writable after hardening.

How to fix Improper Data Handling?

Upgrade ses to version 0.16.0 or higher.

<0.16.0