Embedded Malicious Code Affecting @lottiefiles/lottie-player package, versions >=2.0.5 <2.0.8


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-LOTTIEFILESLOTTIEPLAYER-8310516
  • published 31 Oct 2024
  • disclosed 30 Oct 2024
  • credit Unknown

Introduced: 30 Oct 2024

New Malicious CVE NOT AVAILABLE CWE-506 Open this link in a new tab

How to fix?

Avoid using all malicious instances of the @lottiefiles/lottie-player package.

Overview

@lottiefiles/lottie-player is a Lottie animation and Telegram Sticker player web components.

Affected versions of this package are vulnerable to Embedded Malicious Code that prompts for connecting to the user’s crypto wallets, potentially leading to unauthorized transfers of digital assets.

The malicious code was added to npm releases 2.0.5, 2.0.6, and 2.0.7 after a token used for npm publication was compromised. These versions have been pulled from npm and 2.0.8 was released from the safe code in the project's GitHub repo, with identical content to that of 2.0.4. Upgrade and downgrade will both remediate this issue.

References

CVSS Scores

version 4.0
version 3.1
Expand this section

Snyk

Recommended
9.3 critical
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Attack Requirements (AT)
    None
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Confidentiality (VC)
    High
  • Integrity (VI)
    High
  • Availability (VA)
    None
  • Confidentiality (SC)
    None
  • Integrity (SI)
    None
  • Availability (SA)
    None