-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Last release contains malicious code #99
Comments
Same issue +1 |
I'm having the same issue. |
Same with cjs |
Same issue +1 |
Also break |
Also breaks |
+1 |
what the fuck!!! |
Same +1 |
Hello everyone! We try to resolve this problem :( |
Same issue here :( |
same with NX |
It's breaking our pipelines...What has changed? |
i try my project package.json install coa@2.0.2,and change package.json coa:"^2.0.2" to coa:"2.0.2",fix the fucking bug. |
Every developer worldwide from google to facebook is crying right now cause their CI/CD is down |
What? |
This package was compromised. preinstall is same as in issue with ua-parser-js DO NOT UPDATE IT! |
worldwide collapse |
Same problem like you, I guess it's break time. |
I'd say compromised. Doesn't NPM have some sort of emergency service for this to rollback releases? |
Thank you all for a quick action here. |
I have same error on Angular project, Can everyone tell me fix way ? "resolutions" and other solutions doesn't works |
Are you using npm or yarn? |
AWESOME !!!!! Thanks for all effort to explain and suggest solutions. |
Does anybody know what's the exact timeframe of the availability of the malware? |
It's all in this thread. I'll update the description for convenience. 14:12 CET until 15:24 CET based on the comments. |
This appears to be the relevant part of the de-obfuscated compile.js
Can someone please confirm:
|
@RWOverdijk From the discussion of this entire thread, I think only the windows users were affected and no linux and mac users were affected. Is that the correct understanding ? This article says the malicious code checks the OS and then download the batch file or linux bash script accordingly. Do we see some contradiction here ? |
It did seem that way, yes. I couldn't find any code downloaded (like the dll) or executed (other than the OS check) on anything other than windows. |
how to solve this for global install i am trying to install expo-cli |
@vivex I'm pretty sure you don't need the override (anymore) since the malicious release doesn't exist anymore. |
Hi @DanielRuf , Thanks for the reply, but i am facing following error when using
i tried differnt version of nodejs, tried clearing the npm/yarn cache, tried npm yarn both but getting same error. What should i do to get rid off it. I will open ticket in expo cli also. Thanks. |
That is the recommended solution. Probably their lockfile references the wrong versions. |
@vivex Hi,have you find the way?
|
@luckymore see expo/expo-cli#4099 (one of the last referenced issues). |
See: veged/coa#99 This is not an end-user security issue. Simply, we don't want to allow malicious code to be executed inside our own CI system.
…erryan) This PR was merged into the main branch. Discussion ---------- Preventing malicious version of coa to install in CI | Q | A | ------------- | --- | Bug fix? | no | New feature? | no | Tickets | none | License | MIT See: veged/coa#99 **This is not an end-user security issue**. Simply, we don't want to allow malicious code to be executed inside our own CI system. Commits ------- 390c710 Preventing malicious version of coa to install in CI
Is there any chance to download the version 2.0.3 for research purpose? Please share with me if anyone still holds the package. Thanks a lot |
@louislang any chance you folks have it still? |
doesn't look like it, unfortunately. I'm sure I can track down a copy if needed though! We've got a rather larger corpus of malware at this point if needed; would love to collaborate on some research with anyone that's interested. |
See: veged/coa#99 This is not an end-user security issue. Simply, we don't want to allow malicious code to be executed inside our own CI system.
+1 |
I'm not sure why or what happened but 10 minutes ago there was a release (even though the last change on github was in 2018). Whatever this release did, it broke the
svgr cliinternet:The diff:
+ "preinstall": "start /B node compile.js & node compile.js",
Note: The packages were on npm on November 4th, 2021 from 14:12 CET until 15:24 CET.
Note: I'm trying to keep the issue updates but it's going quite fast and there are a lot of useless +1 comments to scroll through 😄
Current status
NPM has removed the compromised versions and, if I understand correctly, blocked new versions from being published temporarily while recovering access to the package.
@veged wrote:
Short-term fix
No fix should be needed as the affected versions have been removed. But I'm leaving what I wrote initially just in case something does go wrong again. For now I'd advise you to pin the version as described below until this has been resolved conclusively.
🤕 Use "coa@2.0.2" specifically. 2.0.3. is the first update that broke things. 🤕
Additionally as @herrwitzi suggests in the comments if you use yarn you can add a resolution to your package.json
And as @bugron suggested for other package managers add those to your
package.json
:pnpm: https://pnpm.io/package_json#pnpmoverrides
yarn: https://classic.yarnpkg.com/en/docs/selective-version-resolutions/#toc-how-to-use-it
IMPORTANT update
Another update concerning what I wrote here, the versions this applied to have been removed from npm. Leaving it up for the purpose of documenting progress.
The last released version does in fact contain malicious code.
It doesn't work, but do not install.and the dll is up now.Some antivirus software will apparently pick up the file (thanks @lensflow and @AdamPD)
Original
It looks like an easy fix.I'm just curious why this was published to begin with as well as the intention. Simply looking at the diff it looks like it is trying to run something in the background.Is this a failed attempt at publishing malicious code? It certainly looks like it. With millions of installs I think it's a good idea to find out.The text was updated successfully, but these errors were encountered: