A high severity vulnerability recently addressed in popular NPC package Pac-Resolver could be exploited to execute arbitrary code remotely.
The vulnerability (CVE-2021-23406, CVSS score of 8.1) was discovered and reported by Tim Perry on May 30. The issue was addressed with the release of Pac-Resolver 5.0.0 in late July, but information on it wasn’t made public until last week.
In a blog post, Perry explains that the security hole can be exploited by an attacker on the local network to execute arbitrary code remotely inside the Node.js process when the user attempts to send an HTTP request.
A PAC file is essentially a piece of JavaScript code that informs an HTTP client which proxy to use for a given hostname and can be used for the distribution of complex proxy rules, given that a single file could map multiple links to different proxies.
Perry discovered the issue in Pac-Proxy-Agent, which relies on two packages – Pac-Resolver and Degenerator – to build the PAC function, without offering a security mechanism for the execution of supplied code.
Pac-Resolver was designed to generate an asynchronous resolver function from a PAC (Proxy Auto-Config) file. The package has roughly 3 million weekly downloads, with nearly 290,000 GitHub repositories depending on it.
“If you accept and use an untrusted PAC file, this is very bad. Every time you make a request using the PAC file, it can run arbitrary code and do anything on your system,” the researcher says.
For successful exploitation, however, an attacker needs to be on the local network and also needs a second flaw, such as a vulnerable configuration, to set configuration values.
“Anybody using a Node.js CLI tool designed to support enterprise proxies in a coffee shop, hotel or airport is potentially vulnerable, for example,” the researcher explains.
The attacker would need to provide a malicious PAC file that could break out of the VM module sandbox and then convince the potential victim to use the PAC file as their proxy configuration, which would allow the attacker to run arbitrary code on their machine.
To patch the issue, the VM2 npm module was implemented. Not only was it designed to run untrusted code, but is also hardened to block sandbox escapes.
“If you depend on Pac-Resolver, and there’s any way you might be using PAC files in your proxy configuration: update to Pac-Resolver v5+ now,” the researcher recommends.
Related: Cisco, Sonatype and Others Join Open Source Security Foundation
Related: New Google Tool Helps Developers Visualize Open Source Dependencies
Related: CodeCov Discloses Ominous Software Supply Chain Hack

More from Ionut Arghire
- New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
- Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions
- Google, Yahoo Boosting Email Spam Protections
- US Executives Targeted in Phishing Attacks Exploiting Flaw in Indeed Job Platform
- Dozens of Malicious NPM Packages Steal User, System Data
- Motel One Discloses Ransomware Attack Impacting Customer Data
- Android’s October 2023 Security Updates Patch Two Exploited Vulnerabilities
- European Telecommunications Standards Institute Discloses Data Breach
Latest News
- Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day
- Atlassian Ships Urgent Patch for Exploited Confluence Zero-Day
- New Supermicro BMC Vulnerabilities Could Expose Many Servers to Remote Attacks
- Lyca Mobile Services Significantly Disrupted by Cyberattack
- Severe Glibc Privilege Escalation Vulnerability Impacts Major Linux Distributions
- Google, Yahoo Boosting Email Spam Protections
- Mozilla Warns of Fake Thunderbird Downloads Delivering Ransomware
- Qualcomm Patches 3 Zero-Days Reported by Google
