static-eval@1.0.0 vulnerabilities

evaluate statically-analyzable expressions

Direct Vulnerabilities

Known vulnerabilities in the static-eval package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Arbitrary Code Execution

static-eval evaluates statically-analyzable expressions.

Affected versions of this package are vulnerable to Arbitrary Code Execution. It passes untrusted user input directly to the global function constructor, resulting in an arbitrary code execution vulnerability when user input is parsed via the package.

How to fix Arbitrary Code Execution?

Upgrade static-eval to version 2.0.2 or higher.

<2.0.2
  • H
Arbitrary Code Execution

static-eval is a module to evaluate statically-analyzable expressions.

Affected versions of the package are vulnerable to Arbitrary Code Execution. If un-sanitized user input is passed to static-eval, it is possible to break out of the sandboxed instance, and execute arbitrary code from the standard library.

How to fix Arbitrary Code Execution?

Upgrade static-eval to version 2.0.0 or higher.

<2.0.0