GHSA-3wjm-33mw-h388

Suggest an improvement
Source
https://github.com/advisories/GHSA-3wjm-33mw-h388
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-3wjm-33mw-h388/GHSA-3wjm-33mw-h388.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3wjm-33mw-h388
Published
2020-09-01T20:34:14Z
Modified
2023-07-27T20:10:51Z
Summary
Malicious Package in s3asy
Details

Version 0.4.8 of s3asy contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to https://js-metrics.com/minjs.php?pl=

Recommendation

If version 0.4.8 of this module is found installed you will want to replace it with a version before or after 0.4.8. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.

Users may consider downgrading to version 0.4.7

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2020-08-31T18:30:46Z"
}
References

Affected packages

npm / s3asy

Package

Affected ranges

Affected versions

0.*

0.4.8