Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. asteval
  4. ›
  5. GHSA-vp47-9734-prjw

GHSA-vp47-9734-prjw: ASTEVAL Allows Malicious Tampering of Exposed AST Nodes Leads to Sandbox Escape

January 23, 2025

If an attacker can control the input to the asteval library, they can bypass its safety restrictions and execute arbitrary Python code within the application’s context.

References

  • github.com/advisories/GHSA-vp47-9734-prjw
  • github.com/lmfit/asteval
  • github.com/lmfit/asteval/commit/45bb47533f7abb5479618ae7f6a809215700dcb2
  • github.com/lmfit/asteval/security/advisories/GHSA-vp47-9734-prjw

Code Behaviors & Features

Detect and mitigate GHSA-vp47-9734-prjw with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.0.6

Fixed versions

  • 1.0.6

Solution

Upgrade to version 1.0.6 or above.

Impact 8.4 HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition
  • CWE-749: Exposed Dangerous Method or Function

Source file

pypi/asteval/GHSA-vp47-9734-prjw.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:22 +0000.