logo

GHSA-j4ch-mw66-xmqv pensi-scheduler

Package

Manager: npm
Name: pensi-scheduler
Vulnerable Version: =1.1.3

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: N/A pctlN/A

Details

Malicious Package in pensi-scheduler Version 1.1.3 of `pensi-scheduler` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.1.2

Metadata

Created: 2020-09-03T19:16:44Z
Modified: 2023-07-27T00:07:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-j4ch-mw66-xmqv/GHSA-j4ch-mw66-xmqv.json
CWE IDs: []
Alternative ID: N/A
Finding: F448
Auto approve: 1