Vulnerabilities

1 via 12 paths

Dependencies

419

Source

GitHub

Commit

59b7e373

Find, fix and prevent vulnerabilities in your code.

Severity
  • 1
Status
  • 1
  • 0
  • 0

critical severity
new

Malicious Package

  • Vulnerable module: debug
  • Introduced through: astro@5.13.7 and astro-icon@1.1.5

Detailed paths

  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 @astrojs/telemetry@3.3.0 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro-icon@1.1.5 @iconify/utils@2.3.0 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro-icon@1.1.5 @iconify/tools@4.1.3 @iconify/utils@2.3.0 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro-icon@1.1.5 @iconify/tools@4.1.3 extract-zip@2.0.1 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 @astrojs/markdown-remark@6.3.6 remark-parse@11.0.0 mdast-util-from-markdown@2.0.2 micromark@4.0.2 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 @astrojs/markdown-remark@6.3.6 remark-gfm@4.0.1 mdast-util-gfm@3.1.0 mdast-util-from-markdown@2.0.2 micromark@4.0.2 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 @astrojs/markdown-remark@6.3.6 remark-gfm@4.0.1 remark-parse@11.0.0 mdast-util-from-markdown@2.0.2 micromark@4.0.2 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 @astrojs/markdown-remark@6.3.6 remark-gfm@4.0.1 mdast-util-gfm@3.1.0 mdast-util-gfm-footnote@2.1.0 mdast-util-from-markdown@2.0.2 micromark@4.0.2 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 @astrojs/markdown-remark@6.3.6 remark-gfm@4.0.1 mdast-util-gfm@3.1.0 mdast-util-gfm-strikethrough@2.0.0 mdast-util-from-markdown@2.0.2 micromark@4.0.2 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 @astrojs/markdown-remark@6.3.6 remark-gfm@4.0.1 mdast-util-gfm@3.1.0 mdast-util-gfm-table@2.0.0 mdast-util-from-markdown@2.0.2 micromark@4.0.2 debug@4.4.3
  • Introduced through: @onwidget/astrowind@onwidget/astrowind#59b7e373d87503686b81bcfb6c7d8f3923eaf698 astro@5.13.7 @astrojs/markdown-remark@6.3.6 remark-gfm@4.0.1 mdast-util-gfm@3.1.0 mdast-util-gfm-task-list-item@2.0.0 mdast-util-from-markdown@2.0.2 micromark@4.0.2 debug@4.4.3

Overview

debug is a malicious package. This package version contains malicious code that listens for network traffic when run in the context of a browser and focuses on crypto transactions. The malicious code injected to the packages activates a hook whenever a Web3 wallet is present. Once activated the code intercepts and modifies any transaction with ETH value and points it to another address presumably controlled by the attacker. The malicious code also listens for swap/transfer transactions to tamper with as well.

Note:

This advisory is under ongoing investigation and can be updated with additional details.

Remediation

Avoid using all malicious instances of the debug package.

References