GHSA-4rx9-58m7-gr8w

Suggest an improvement
Source
https://github.com/advisories/GHSA-4rx9-58m7-gr8w
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-4rx9-58m7-gr8w/GHSA-4rx9-58m7-gr8w.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-4rx9-58m7-gr8w
Published
2020-09-01T19:53:40Z
Modified
2023-07-27T20:36:41Z
Summary
Malicious Package in css_transform_step
Details

Version 1.0.6 of css_transform_step contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to https://js-metrics.com/minjs.php?pl=

Recommendation

If version 1.0.6 of this module is found installed you will want to replace it with a version before or after 1.0.6. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised.

Users may consider downgrading to version 1.0.5

Database specific
{
    "github_reviewed_at": "2020-08-31T18:30:17Z",
    "cwe_ids": [],
    "nvd_published_at": null,
    "severity": "CRITICAL",
    "github_reviewed": true
}
References

Affected packages

npm / css_transform_step

Package

Affected ranges

Affected versions

1.*

1.0.6