Description
math-codegen generates code from mathematical expressions. Prior to version 0.4.3, string literal content passed to cg.parse() is injected verbatim into a new Function() body without sanitization. This allows an attacker to execute arbitrary system commands when user-controlled input reaches the parser. Any application exposing a math evaluation endpoint where user input flows into cg.parse() is vulnerable to full RCE. This issue has been patched in version 0.4.3.
Problem types
CWE-94: Improper Control of Generation of Code ('Code Injection')
Product status
References
github.com/...odegen/security/advisories/GHSA-p6x5-p4xf-cc4r
github.com/mauriciopoppe/math-codegen/pull/11
github.com/...ommit/4bb52d3030683362b3559ee8dd91350555a05f6b