Skip to content

Malicious code in `loadyaml`

Critical severity GitHub Reviewed Published Oct 1, 2020 • Updated Oct 4, 2021

Package

npm loadyaml (npm)

Affected versions

<= 1.0.2

Patched versions

None

Description

npm packages loadyaml and electorn were removed from the npm registry for containing malicious code. Upon installation the package runs a preinstall script that writes a public comment on GitHub containing the following information:

  • IP and IP-based geolocation
  • home directory name
  • local username

The malicious packages have been removed from the npm registry and the leaked content removed from GitHub.

References

Severity

Critical

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-mfc2-93pr-jf92

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.