Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upI don't know what to say. #116
Comments
This was referenced Nov 20, 2018
This comment has been minimized.
This comment has been minimized.
jaydenseric
commented
Nov 21, 2018
|
@FallingSnow did you manage to work out what the attack does? |
This comment has been minimized.
This comment has been minimized.
FallingSnow
commented
Nov 21, 2018
|
No. I spent a better part of a day trying to get something other than gibberish out of the encrypted AES payload. I've tried executing the gibberish and it errors out. I believe there are 2 possible reasons I haven't been able to get the actual payload's code.
|
This comment has been minimized.
This comment has been minimized.
jaydenseric
commented
Nov 21, 2018
•
|
unpkg link to help other people poke around: https://unpkg.com/flatmap-stream@0.1.1/index.min.js |
This comment has been minimized.
This comment has been minimized.
|
he emailed me and said he wanted to maintain the module, so I gave it to him. I don't get any thing from maintaining this module, and I don't even use it anymore, and havn't for years. |
This comment has been minimized.
This comment has been minimized.
|
note: I no longer have publish rights to this module on npm. |
This comment has been minimized.
This comment has been minimized.
XhmikosR
commented
Nov 22, 2018
|
Please contact npm support and they will take care of the situation. |
This comment has been minimized.
This comment has been minimized.
limonte
commented
Nov 22, 2018
•
npm owner ls event-stream
right9ctrl <right9ctrl@outlook.com>Transfer publishing rights to the unknown dude, but keep the repo under your username. Well done, mate |
This comment has been minimized.
This comment has been minimized.
|
@limonte I tried to transfer it to @right9ctrl but github errored because they already had a fork of it at http://github.com/right9ctrl/event-stream If you guys feel strongly about this, why don't you volunteer to maintain it and contact npm support? |
This comment has been minimized.
This comment has been minimized.
jaydenseric
commented
Nov 23, 2018
|
To know if your project is in danger, run:
The bad actor has publishing rights to Here is an example result from one of my projects:
|
This comment has been minimized.
This comment has been minimized.
XhmikosR
commented
Nov 23, 2018
|
@dominictarr: although I completely disagree with someone else contacting npm support, I contacted npm support myself for now. You put at risk millions of people, and making something for free, but public, means you are responsible for the package. Anyway, I don't want to argue about this, I just want the issue to be solved, because this is a popular package. |
This comment has been minimized.
This comment has been minimized.
limonte
commented
Nov 23, 2018
•
@dominictarr Apparently, you don't want to take any responsibility for this package. That's fine, it's the free community, do whatever you want. But at least indicate somehow that you're not maintaining this repo anymore, e.g. archive the repo
|
This comment has been minimized.
This comment has been minimized.
jaydenseric
commented
Nov 23, 2018
|
There is a huge difference between not maintaining a repo/package, vs giving it away to a hacker (which actually takes more effort than doing nothing), then denying all responsibility to fix it when it affects millions of innocent people. |
yhatt
referenced this issue
Nov 24, 2018
Merged
[Security] Upgrade dependent packages to prevent malicious attack #96
This was referenced Nov 26, 2018
ChrisBAshton
referenced this issue
Nov 26, 2018
Closed
Vulnerability in event-stream dependency #150
added a commit
to BBC-News/simorgh
that referenced
this issue
Nov 26, 2018
jasonwilliams
referenced this issue
Nov 26, 2018
Open
Bump nodemon version to avoid security issue #23
added a commit
to BBC-News/simorgh
that referenced
this issue
Nov 26, 2018
added a commit
to BBC-News/simorgh
that referenced
this issue
Nov 26, 2018
This comment has been minimized.
This comment has been minimized.
Fishrock123
commented
Nov 26, 2018
|
@FallingSnow Heya, could you please update the title to something more informative, and edit in a header section into your OP on what people can do to mitigate/remove/etc this from their codebase? |
This comment has been minimized.
This comment has been minimized.
peterklipfel
commented
Nov 26, 2018
|
@fedidat - this looked suspicious to me: right9ctrl/node-scrypt@f14ed8d#diff-78438df028eeb09f1dee525028604edfR83 But I haven't found any definitive badness yet |
This comment has been minimized.
This comment has been minimized.
ip1981
commented
Nov 26, 2018
|
Copy on write FTW. If you don't maintain the package, abandon it, let others fork and publish under different name, etc |
added a commit
to apollographql/apollo-tooling
that referenced
this issue
Nov 26, 2018
This comment has been minimized.
This comment has been minimized.
maximumultraist
commented
Nov 26, 2018
ILOVECOMPUTERS!!!!!!!!!!!!!!!!11111111111111111111111111111111111!!!!!!!!!!!!!!!!!!!!!!!!!! |
1 similar comment
This comment was marked as off-topic.
This comment was marked as off-topic.
maximumultraist
commented
Nov 26, 2018
ILOVECOMPUTERS!!!!!!!!!!!!!!!!11111111111111111111111111111111111!!!!!!!!!!!!!!!!!!!!!!!!!! |
This comment has been minimized.
This comment has been minimized.
piedoom
commented
Nov 26, 2018
•
No, if you aren't properly auditing your packages, YOU are putting your own project and users at risk. Do not rely on maintainers (especially those who are providing a free service to you) to do all of your development work for you. Maintainers should try to secure their projects, but this entitled attitude is ridiculous. My 2 cents nobody asked for: I understand it's difficult since node projects have somewhere between 150 billion - 12 zillion dependences since JS has a crowdsourced stdlib for whatever reason, but still... If you want security maybe move away from node. Now is a good of a time as any to talk about Rust. It has
|
hwillson
referenced this issue
Nov 26, 2018
Open
Add event-stream as a dep and lock it (security issue) #739
This comment has been minimized.
This comment has been minimized.
lanodan
commented
Nov 26, 2018
What would fix the issue here in my opinion is not having a pile of rights on code, one shouldn’t be allowed to push code this widely, be it for security or just stability. |
kevinburke
referenced this issue
Nov 26, 2018
Open
Backdoored dependency? flatmap-stream-0.1.1 and flatmap-stream-0.1.2 #115
This comment has been minimized.
This comment has been minimized.
shibumi
commented
Nov 26, 2018
•
@paragonie-scott @MattDiMu Then the problem lies in npm itself.. why do they allow such a harmful release policy. |
This comment has been minimized.
This comment has been minimized.
lmcarreiro
commented
Nov 26, 2018
|
@gcardy in the article's attack, it detects if there is a CSP and avoid sending requests from apps that uses a CSP. But my question is if this @right9ctrl attack uses some code to workaround a good CSP or not. If my bitcoin wallet uses this vulnerable package and uses a good CSP, could my wallets been stolen? |
This comment has been minimized.
This comment has been minimized.
ProLoser
commented
Nov 26, 2018
|
Arguing blame is moot at this point. I suggest keeping the discussion focused entirely on solutions before alienating those who may be trying to assist. |
This comment has been minimized.
This comment has been minimized.
shibumi
commented
Nov 26, 2018
Dude I don't think this problem is connected to javascript. The problem lies in the ecosystem around javascript. |
added a commit
to ExtensionEngine/boutique
that referenced
this issue
Nov 26, 2018
This comment has been minimized.
This comment has been minimized.
N3X15
commented
Nov 26, 2018
|
Just an FYI, if you're posting and get "You can't comment at this time", be patient, don't mash comment twice. GitHub is currently being awful and is spitting out false errors. It'll go through after a minute or so. |
This comment has been minimized.
This comment has been minimized.
piedoom
commented
Nov 26, 2018
|
This comment has been minimized.
This comment has been minimized.
shibumi
commented
Nov 26, 2018
|
@dominictarr @FallingSnow maybe just close this issues and stop commenting on it? |
This comment has been minimized.
This comment has been minimized.
bennyty
commented
Nov 26, 2018
|
@lmcarreiro It's important to note that the article's attacks and CSP-avoiding workarounds are entirely theoretical. FYI for anyone who hasn't read it.
|
This comment has been minimized.
This comment has been minimized.
zawadzkip
commented
Nov 26, 2018
|
This comment has been minimized.
This comment has been minimized.
1 similar comment
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
MaPePeR
commented
Nov 26, 2018
Not sure if you mean @dominictarr or all the people that used this package as a dependency. |
This comment has been minimized.
This comment has been minimized.
pcworld
commented
Nov 26, 2018
|
@patosai Doesn't the source code use 1000 (and not 100) as the limit for Bitcoin Cash? |
This comment has been minimized.
This comment has been minimized.
mautematico
commented
Nov 26, 2018
|
@fharper I think it's worth trying to get your attention on this; may be npm can help with an aditional step before allowing publishing an update that introduces security risks to a popular package or something? |
This comment has been minimized.
This comment has been minimized.
pcworld
commented
Nov 26, 2018
|
@patosai Doesn't the source code use 1000 (and not 100) as the limit for Bitcoin Cash? |

FallingSnow commentedNov 20, 2018
@dominictarr Why was @right9ctrl given access to this repo? He added flatmap-stream which is entirely (1 commit to the repo but has 3 versions, the latest one removes the injection, unmaintained, created 3 months ago) an injection targeting ps-tree. After he adds it at almost the exact same time the injection is added to
flatmap-stream, he bumps the version and publishes. Literally the second commit (3 days later) after that he removes the injection and bumps a major version so he can clear the repo of havingflatmap-streambut still have everyone (millions of weekly installs) using 3.x affected.@right9ctrl If you removed flatmap-stream because your realized it was an injection attack why didn't you yank
event-stream@3.3.6from npm and put a PSA? If you didn't know, why did you choose to use a completely unused/unknown library (0 downloads on npm until you use it)? If I had the exact date from npm in whichflatmap-stream@0.1.1was published I wouldn't be asking you questions.I've included a break down of what I have so far on
flatmap-streambelow. It includes the portion of code not found in the unminified source offlatmap-stream@0.1.1but found in the minified source. The code has been cleaned up a little to get a better understanding.The worst part is I still don't even know what this does... The decrypted data n[0] is byte code or something, not regular javascript, or maybe I'm just not handling it correctly.