GHSA-4g54-95xv-f353

Suggest an improvement
Source
https://github.com/advisories/GHSA-4g54-95xv-f353
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/08/GHSA-4g54-95xv-f353/GHSA-4g54-95xv-f353.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4g54-95xv-f353
Aliases
  • CVE-2017-16075
Published
2018-08-29T23:16:56Z
Modified
2023-11-08T03:59:03.330839Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
http-proxy.js is malware
Details

The http-proxy.js package is a piece of malware that steals environment variables and sends them to attacker controlled locations.

All versions have been unpublished from the npm registry.

Recommendation

As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.

If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.

Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.

Database specific
{
    "github_reviewed_at": "2020-06-16T20:58:19Z",
    "cwe_ids": [
        "CWE-506"
    ],
    "nvd_published_at": null,
    "severity": "HIGH",
    "github_reviewed": true
}
References

Affected packages

npm / http-proxy.js

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.0.2