How can malicious user input can execute arbitrary code?See original GitHub issue
I was hoping to use static-eval to execute user input without
eval. The user can write expressions using a build-in set of pre-defined functions passed into static-eval’s evaluate. However the readme states:
static-eval is like eval. It is intended for use in build scripts and code transformations, doing some evaluation at build time—it is NOT suitable for handling arbitrary untrusted user input. Malicious user input can execute arbitrary code.
How could this be done? I couldn’t see how it would be possible.
Does this warning date back to before the 2.0.0 release (i.e. this vunerability: https://maustin.net/articles/2017-10/static_eval) and not apply with the current version?
- Created 5 years ago
Top GitHub Comments
for executing user input, you need a sandbox or a dedicated VM