ghsa-85fq-56wq-gmcf
Vulnerability from github
Withdrawn Advisory
This advisory has been withdrawn because MariaDB now owns https://www.npmjs.com/package/mariadb and the package is no longer malicious. This link is maintained to preserve external references.
Original Description
The mariadb
package is a piece of malware that steals environment variables and sends them to attacker controlled locations.
All versions have been unpublished from the npm registry.
Recommendation
As this package is malware, if you find it installed in your environment, the real security concern is determining how it got there.
If you have found this installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables.
Additionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.
{ "affected": [ { "package": { "ecosystem": "npm", "name": "mariadb" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "1.0.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2017-16046" ], "database_specific": { "cwe_ids": [ "CWE-506" ], "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:24:26Z", "nvd_published_at": null, "severity": "HIGH" }, "details": "# Withdrawn Advisory\n\nThis advisory has been withdrawn because MariaDB now owns https://www.npmjs.com/package/mariadb and the package is no longer malicious. This link is maintained to preserve external references.\n\n# Original Description\n\nThe `mariadb` package is a piece of malware that steals environment variables and sends them to attacker controlled locations. \n\nAll versions have been unpublished from the npm registry.\n\n\n## Recommendation\n\nAs this package is malware, if you find it installed in your environment, the real security concern is determining how it got there. \n\nIf you have found this installed in your environment, you should:\n1. Delete the package\n2. Clear your npm cache\n3. Ensure it is not present in any other package.json files on your system\n4. Regenerate your registry credentials, tokens, and any other sensitive credentials that may have been present in your environment variables. \n\nAdditionally, any service which may have been exposed via credentials in your environment variables, such as a database, should be reviewed for indicators of compromise as well.", "id": "GHSA-85fq-56wq-gmcf", "modified": "2024-04-19T18:09:24Z", "published": "2018-07-18T18:28:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16046" }, { "type": "WEB", "url": "https://www.npmjs.com/package/mariadb/v/1.0.1?activeTab=code" }, { "type": "WEB", "url": "https://www.npmjs.com/package/mariadb/v/1.0.2?activeTab=code" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ], "summary": "Withdrawn Advisory: mariadb was malware", "withdrawn": "2024-04-19T18:09:24Z" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.