Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jcxm-7wvp-g6p5

Опубликовано: 04 дек. 2024
Источник: github
Github: Прошло ревью
CVSS4: 8.3

Описание

Modified package published to npm, containing malware that exfiltrates private key material

Earlier today, a publish-access account was compromised for @solana/web3.js, a JavaScript library that is commonly used by Solana dapps. This allowed an attacker to publish unauthorized and malicious packages that were modified, allowing them to steal private key material and drain funds from dapps, like bots, that handle private keys directly. This issue should not affect non-custodial wallets, as they generally do not expose private keys during transactions. This is not an issue with the Solana protocol itself, but with a specific JavaScript client library and only appears to affect projects that directly handle private keys and that updated within the window of 3:20pm UTC and 8:25pm UTC on Tuesday, December 3, 2024.

These two unauthorized versions (1.95.6 and 1.95.7) were caught within hours and have since been unpublished.

We are asking all Solana app developers to upgrade to version 1.95.8. Developers pinned to latest should also upgrade to 1.95.8.

Developers that suspect they might be compromised should rotate any suspect authority keys, including multisigs, program authorities, server keypairs, and so on.

Пакеты

Наименование

@solana/web3.js

npm
Затронутые версииВерсия исправления

>= 1.95.6, < 1.95.8

1.95.8

EPSS

Процентиль: 50%
0.00266
Низкий

8.3 High

CVSS4

Дефекты

CWE-200

Связанные уязвимости

nvd
около 1 года назад

A publish-access account was compromised for `@solana/web3.js`, a JavaScript library that is commonly used by Solana dapps. This allowed an attacker to publish unauthorized and malicious packages that were modified, allowing them to steal private key material and drain funds from dapps, like bots, that handle private keys directly. This issue should not affect non-custodial wallets, as they generally do not expose private keys during transactions. This is not an issue with the Solana protocol itself, but with a specific JavaScript client library and only appears to affect projects that directly handle private keys and that updated within the window of 3:20pm UTC and 8:25pm UTC on Tuesday, December 3, 2024. These two unauthorized versions (1.95.6 and 1.95.7) were caught within hours and have since been unpublished. All Solana app developers should upgrade to version 1.95.8. Developers that suspect they might be compromised should rotate any suspect authority keys, including multisigs, p

CVSS3: 7.4
fstec
около 1 года назад

Уязвимость функции addToQueue() пакета разработки для блокчейн-платформы Solana web3.js, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 50%
0.00266
Низкий

8.3 High

CVSS4

Дефекты

CWE-200