Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-10760 PoC — safer-eval 代码注入漏洞

Source
Associated Vulnerability
Title:safer-eval 代码注入漏洞 (CVE-2019-10760)
Description:safer-eval before 1.3.2 are vulnerable to Arbitrary Code Execution. A payload using constructor properties can escape the sandbox and execute arbitrary code.
Description
Publicly disclosed Proof-of-Concept (POC) exploit for the safer-eval@1.3.1 version
Readme
# safer-eval-cve-CVE-2019-10760

The following proof-of-concept (POC) exploit addressing `safer-eval` version 1.3.1 and below is the first publicly known payload to attack this version range.

File Snapshot

[4.0K] /data/pocs/58a7c5aae52c22fa977539f6028b787aef9844b3 ├── [ 301] index.js ├── [ 295] package.json ├── [ 995] package-lock.json └── [ 193] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →