The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer weakness announce 19246

Node.js: code execution via npm

Synthesis of the vulnerability

An attacker can invite the victim to install a malicious package with npm of Node.js, in order to run code.
Severity of this computer vulnerability: 2/4.
Creation date: 29/03/2016.
Références of this announce: VIGILANCE-VUL-19246, VU#319816.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Node.js product uses npm to manage packages.

However, a malicious package can contain scripts, which are run during the installation, or during its usage.

If the victim has publication privileges, a worm can use these scripts to inject itself in new packages published on the internet.

An attacker can therefore invite the victim to install a malicious package with npm of Node.js, in order to run code.
Full Vigil@nce bulletin... (Free trial)

This security alert impacts software or systems such as Nodejs Modules ~ not comprehensive.

Our Vigil@nce team determined that the severity of this security weakness is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this security announce.

Solutions for this threat

Node.js: workaround for npm.
A workaround is to run:
  npm install --ignore-scripts
Then, inspect scripts before using this package.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides an applications vulnerabilities note. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce vulnerability database contains several thousand vulnerabilities.