{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-26122","assignerOrgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","state":"PUBLISHED","assignerShortName":"snyk","dateReserved":"2023-02-20T10:28:48.923Z","datePublished":"2023-04-11T05:00:02.658Z","dateUpdated":"2025-02-07T16:56:45.658Z"},"containers":{"cna":{"metrics":[{"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P"}}],"credits":[{"value":"seongil-wi","lang":"en"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-265","description":"Sandbox Bypass","lang":"en"}]}],"providerMetadata":{"orgId":"bae035ff-b466-4ff4-94d0-fc9efd9e1730","shortName":"snyk","dateUpdated":"2023-04-11T05:00:02.658Z"},"descriptions":[{"value":"All versions of the package safe-eval are vulnerable to Sandbox Bypass due to improper input sanitization. The vulnerability is derived from prototype pollution exploitation.\rExploiting this vulnerability might result in remote code execution (\"RCE\").\r\r**Vulnerable functions:**\r\r__defineGetter__, stack(), toLocaleString(), propertyIsEnumerable.call(),  valueOf().","lang":"en"}],"references":[{"url":"https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064"},{"url":"https://github.com/hacksparrow/safe-eval/issues/27"},{"url":"https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce"},{"url":"https://github.com/hacksparrow/safe-eval/issues/31"},{"url":"https://github.com/hacksparrow/safe-eval/issues/32"},{"url":"https://github.com/hacksparrow/safe-eval/issues/33"},{"url":"https://github.com/hacksparrow/safe-eval/issues/34"},{"url":"https://github.com/hacksparrow/safe-eval/issues/35"}],"affected":[{"product":"safe-eval","versions":[{"version":"0","lessThan":"*","status":"affected","versionType":"semver"}],"vendor":"n/a"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T11:39:06.576Z"},"title":"CVE Program Container","references":[{"url":"https://security.snyk.io/vuln/SNYK-JS-SAFEEVAL-3373064","tags":["x_transferred"]},{"url":"https://github.com/hacksparrow/safe-eval/issues/27","tags":["x_transferred"]},{"url":"https://gist.github.com/seongil-wi/2db6cb884e10137a93132b7f74879cce","tags":["x_transferred"]},{"url":"https://github.com/hacksparrow/safe-eval/issues/31","tags":["x_transferred"]},{"url":"https://github.com/hacksparrow/safe-eval/issues/32","tags":["x_transferred"]},{"url":"https://github.com/hacksparrow/safe-eval/issues/33","tags":["x_transferred"]},{"url":"https://github.com/hacksparrow/safe-eval/issues/34","tags":["x_transferred"]},{"url":"https://github.com/hacksparrow/safe-eval/issues/35","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1321","lang":"en","description":"CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-07T16:56:24.542670Z","id":"CVE-2023-26122","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-07T16:56:45.658Z"}}]}}