logo

GHSA-j5jc-jf8f-86q7 dictum.js

Package

Manager: npm
Name: dictum.js
Vulnerable Version: =1.0.5

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: N/A pctlN/A

Details

Malicious Package in dictum.js Version 1.0.5 of `dictum.js` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation If version 1.0.5 of this module is found installed you will want to replace it with a version before or after 1.0.5. In addition to replacing the installed module, you will also want to evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.0.4

Metadata

Created: 2020-09-01T20:38:30Z
Modified: 2023-07-27T20:34:44Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-j5jc-jf8f-86q7/GHSA-j5jc-jf8f-86q7.json
CWE IDs: []
Alternative ID: N/A
Finding: F448
Auto approve: 1