-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Demo5 #5
Demo5 #5
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1 @@ | ||
TRwzkRJnHOTckssAeyJbysWgP!Qc2T | ||
TRwzkRJnHOTckssAeyJbysWgP!Qc2T |
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -731,6 +731,8 @@ async function createOrders () { | |
const script = new VMScript(createOrders); | ||
try { | ||
const result = vm.run(script); | ||
const result = vm.run(script); | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Risk: The package vm2 3.x before 3.9.11 is vulnerable to a sandbox bypass which enables arbitrary code to run out of the sandbox context, leading to execution on the host machine. It is recommended to upgrade to vm2 3.9.11. Fix: Upgrade this library to at least version 3.9.11 at JS-App/package-lock.json:67635. Reference(s): GHSA-mrgp-mrhc-5jrq, CVE-2022-36067 Ignore this finding from ssc-4035c22a-c2c2-4a3a-9bdf-5fa36b0bb1ce. |
||
|
||
console.log("Result from VM:", result); | ||
} catch (error) { | ||
console.error("Error in VM:", error); | ||
|
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Risk: vm2 versions before 3.9.16 are vulnerable to Improper Control Of Dynamically-Managed Code Resources allowing attackers to bypass handleException() and leak unsanitized host exceptions which can be used to escape the sandbox and run arbitrary code in host context.
Fix: Upgrade this library to at least version 3.9.16 at JS-App/package-lock.json:67635.
Reference(s): GHSA-xj72-wvfv-8985, CVE-2023-29199
Ignore this finding from ssc-d68b627b-18e0-4a15-892f-4ad0052bbd9a.