Snyk has reported that there have been attempts or successful attacks targeting this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAvoid using cdn-icon-fetch
altogether.
cdn-icon-fetch is a Malicious package.
Affected versions of this package are vulnerable to Embedded Malicious Code.
Once this package is installed and executed, it downloads a Javascript file from a cdn-static-server.vercel.app
URL, which appears to be an image hosting site. However, by using a specific custom header, as described in the library, the JavaScript file is downloaded as a first-stage loader. This loader subsequently downloads a .npl
file, which acts as a second-stage loader written in Python. Ultimately, a third Python file, which is the actual payload and referenced in a specific Medium article, is executed.