GHSA-PV55-R6J3-WP94
Vulnerability from github – Published: 2020-09-01 20:45 – Updated: 2023-07-27 00:04
VLAI?
Summary
Malicious Package in eslint-config-eslint
Details
Version 5.0.2 of eslint-config-eslint was published without authorization and was found to contain malicious code. This code would read the users .npmrc file and send any found authentication tokens to a remote server.
Recommendation
The best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens
Users may consider downgrading to version 5.0.1
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "eslint-config-eslint"
},
"versions": [
"5.0.2"
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [],
"github_reviewed": true,
"github_reviewed_at": "2020-08-31T18:32:17Z",
"nvd_published_at": null,
"severity": "CRITICAL"
},
"details": "Version 5.0.2 of `eslint-config-eslint` was published without authorization and was found to contain malicious code. This code would read the users `.npmrc` file and send any found authentication tokens to a remote server.\n\n\n## Recommendation\n\nThe best course of action if you found this package installed in your environment is to revoke all your npm tokens. You can find instructions on how to do that here. https://docs.npmjs.com/getting-started/working_with_tokens#how-to-revoke-tokens\n\nUsers may consider downgrading to version 5.0.1",
"id": "GHSA-pv55-r6j3-wp94",
"modified": "2023-07-27T00:04:06Z",
"published": "2020-09-01T20:45:57Z",
"references": [
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/674"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Malicious Package in eslint-config-eslint"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…