GHSA-c722-pv5w-cfg2

Suggest an improvement
Source
https://github.com/advisories/GHSA-c722-pv5w-cfg2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-c722-pv5w-cfg2/GHSA-c722-pv5w-cfg2.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-c722-pv5w-cfg2
Published
2020-09-11T21:20:14Z
Modified
2023-07-27T20:17:08Z
Summary
Malicious Package in github-jquery-widgets
Details

Version 0.1.2 of github-jquery-widgets contained malicious code. The code when executed in the browser would enumerate password, cvc and cardnumber fields from forms and send the extracted values to https://js-metrics.com/minjs.php?pl=

Recommendation

Remove the package from your environment and evaluate your application to determine whether or not user data was compromised.

Users may consider downgrading to version 0.1.1

Database specific
{
    "nvd_published_at": null,
    "severity": "CRITICAL",
    "github_reviewed_at": "2020-08-31T18:41:02Z",
    "github_reviewed": true,
    "cwe_ids": []
}
References

Affected packages

npm / github-jquery-widgets

Package

Name
github-jquery-widgets
View open source insights on deps.dev
Purl
pkg:npm/github-jquery-widgets

Affected ranges

Affected versions

0.*

0.1.2