ikst@0.0.1-security vulnerabilities

security holding package

  • latest version

    0.0.1-security

  • first published

    3 years ago

  • latest version published

    3 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the ikst package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Malicious Package

    ikst is a malicious package that was used to collect download metrics beyond what npm provides, and sent them to google analytics or piwik. This can cause a privacy concern amongst users.

    This is especially dangerous in production runtime environments, where environment variables tend to consist of keys, passwords, tokens and other secrets.

    Example:

    {
      "name": "npm_scripts_test_metrics",
      "scripts": {
        "preinstall": "curl 'http://google-analytics.com/collect?v=1&t=event&tid=....'",
        "postinstall": "curl 'http://google-analytics.com/collect?v=1&t=event&tid=....'"
      }
    },
    {
      "name": "subtitles-lib",
      "scripts": {
        "postinstall": "bash -c 'curl \"http://*****.piwikpro.com/piwik.php?idsite=3&rec=1&action_name=$HOSTNAME\"'"
      }
    }
    

    The list of packages and their scripts are:

    npm_scripts_test_metrics
    subtitles-lib
    ikst
    botbait
    mktmpio
    anarchy
    

    How to fix Malicious Package?

    Avoid usage of this package altogether.

    *
    • H
    Resources Downloaded over Insecure Protocol

    ikst Affected versions of the package are vulnerable to Man in the Middle (MitM) attacks due to downloading resources over an insecure protocol. Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server.

    You can read more about Resources Downloaded over Insecure Protocol on our blog.

    How to fix Resources Downloaded over Insecure Protocol?

    Upgrade ikst to version 1.1.2 or higher.

    <1.1.2