NPM maintainers have addressed a vulnerability that could allow a package publisher to modify and/or gain access to arbitrary files on a user’s system when the package is installed, so-called “binary planting” attacks.
The vulnerability affects versions of NP prior to 6.13.3 (and versions of yarn prior to 1.21.1), a specially crafted entry in the package
“
“In versions of
psa: please update to npm v6.13.4 as soon as possible on all your systems to fix a vulnerability allowing arbitrary path access. learn more about the vulnerabilities, risk and fix here: https://t.co/ejf0XLVobR
— npm (@npmjs) December 12, 2019
The vulnerability affects older versions of yarn, an open-source alternative client developed by Facebook for fetching modules from the registry.
NPM maintainers also addressed a separate vulnerability that could be exploited to create arbitrary
The experts pointed out that vulnerable NPM versions, and all current versions of yarn allow the arbitrary overwriting of an existing binary in the /usr/local/bin directory with another file.
The vulnerability was reported by the developer Daniel Ruf who shared technical details in a blog post.
“While
“
“The problem is that we can define any (valid) paths for the binary name and the file which is then
To carry out the attack it is required an entry for the “bin” key in package
"bin": { "../some/path": "../some/other/path" }
The expert also created
The good news is that NPM has not found any module in the registry that use this attack.
“That does not guarantee that it hasn’t been used, but it does mean that it isn’t currently being used in published packages on the registry,” NPM’s security team said.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(
[adrotate banner=”5″]
[adrotate banner=”13″]