GHSA-j4ch-mw66-xmqv – pensi-scheduler
Package
Manager: npm
Name: pensi-scheduler
Vulnerable Version: =1.1.3
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: N/A pctlN/A
Details
Malicious Package in pensi-scheduler Version 1.1.3 of `pensi-scheduler` contained malicious code. The code when executed in the browser would enumerate password, cvc, cardnumber fields from forms and send the extracted values to `https://js-metrics.com/minjs.php?pl=` ## Recommendation Remove the package from your environment. It's also recommended to evaluate your application to determine whether or not user data was compromised. Users may consider downgrading to version 1.1.2
Metadata
Created: 2020-09-03T19:16:44Z
Modified: 2023-07-27T00:07:25Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/09/GHSA-j4ch-mw66-xmqv/GHSA-j4ch-mw66-xmqv.json
CWE IDs: []
Alternative ID: N/A
Finding: F448
Auto approve: 1