Vulnerabilities

1 via 7 paths

Dependencies

50

Source

GitHub

Commit

0a0f1413

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
Status
  • 1
  • 0
  • 0

critical severity
new

Malicious Package

  • Vulnerable module: debug
  • Introduced through: remark-gfm@1.0.0 and remark-parse@9.0.0

Detailed paths

  • Introduced through: slackify-markdown@jsarafajr/slackify-markdown#0a0f141349876548962c4677c8c71b12e0239325 remark-gfm@1.0.0 micromark-extension-gfm@0.3.3 micromark@2.11.4 debug@4.4.3
  • Introduced through: slackify-markdown@jsarafajr/slackify-markdown#0a0f141349876548962c4677c8c71b12e0239325 remark-parse@9.0.0 mdast-util-from-markdown@0.8.5 micromark@2.11.4 debug@4.4.3
  • Introduced through: slackify-markdown@jsarafajr/slackify-markdown#0a0f141349876548962c4677c8c71b12e0239325 remark-gfm@1.0.0 mdast-util-gfm@0.1.2 mdast-util-gfm-autolink-literal@0.1.3 micromark@2.11.4 debug@4.4.3
  • Introduced through: slackify-markdown@jsarafajr/slackify-markdown#0a0f141349876548962c4677c8c71b12e0239325 remark-gfm@1.0.0 micromark-extension-gfm@0.3.3 micromark-extension-gfm-autolink-literal@0.5.7 micromark@2.11.4 debug@4.4.3
  • Introduced through: slackify-markdown@jsarafajr/slackify-markdown#0a0f141349876548962c4677c8c71b12e0239325 remark-gfm@1.0.0 micromark-extension-gfm@0.3.3 micromark-extension-gfm-strikethrough@0.6.5 micromark@2.11.4 debug@4.4.3
  • Introduced through: slackify-markdown@jsarafajr/slackify-markdown#0a0f141349876548962c4677c8c71b12e0239325 remark-gfm@1.0.0 micromark-extension-gfm@0.3.3 micromark-extension-gfm-table@0.4.3 micromark@2.11.4 debug@4.4.3
  • Introduced through: slackify-markdown@jsarafajr/slackify-markdown#0a0f141349876548962c4677c8c71b12e0239325 remark-gfm@1.0.0 micromark-extension-gfm@0.3.3 micromark-extension-gfm-task-list-item@0.3.3 micromark@2.11.4 debug@4.4.3

Overview

debug is a malicious package. This package version contains malicious code that listens for network traffic when run in the context of a browser and focuses on crypto transactions. The malicious code injected to the packages activates a hook whenever a Web3 wallet is present. Once activated the code intercepts and modifies any transaction with ETH value and points it to another address presumably controlled by the attacker. The malicious code also listens for swap/transfer transactions to tamper with as well.

Note:

This advisory is under ongoing investigation and can be updated with additional details.

Remediation

Avoid using all malicious instances of the debug package.

References