Fix critical Remote Code Execution vulnerability by removing eval() function #172
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
This PR fixes a critical Remote Code Execution (RCE) vulnerability in the
/api
endpoint that was allowing arbitrary JavaScript code execution on the server.The Vulnerability
The application was using
eval()
to execute user-provided code received via base64-encoded URL parameters:This allowed attackers to execute any JavaScript code on the server by crafting malicious requests:
The Fix
Replaced the dangerous
eval()
call with a safe response that acknowledges the input without executing it:Security Testing
Added comprehensive security tests (
test_security.js
) that verify:Test Results:
curl "http://server/api?c=Misy"
returned{"result":4}
(executing2+2
){"message":"Code execution disabled for security reasons","received":"2+2"}
Impact
Fixes #171.
Warning
Firewall rules blocked me from connecting to one or more addresses
I tried to connect to the following addresses, but was blocked by firewall rules:
api.ipify.org
node app.js
(dns block)http://168.63.129.16:80/machine/
/usr/bin/python3 -u bin/WALinuxAgent-2.13.1.1-py3.9.egg -collect-logs
(http block)If you need me to access, download, or install something from one of these locations, you can either:
💡 You can make Copilot smarter by setting up custom instructions, customizing its development environment and configuring Model Context Protocol (MCP) servers. Learn more Copilot coding agent tips in the docs.