Command injection vulnerability was identified in NPM package rising version 1.0.2
Resources:
- Project's NPM Package: https://www.npmjs.com/package/rising
- Project's NPM JS registery: https://registry.npmjs.org/rising
# this command will return instances where the child_process module is loaded. | |
# that module is generally a good signal that the application is shelling out | |
egrep -r --exclude-dir "node_modules" --include "*.js" --exclude "*.min.*" -e "require(\s*)\((\s*)'child_process'(\s*))" . | |
# this command will return instances where code is dynamically executed. | |
egrep -r --exclude-dir "node_modules" --include "*.js" --exclude "*.min.*" -e "eval(\s*)\(" . | |
# this command will check common dangerous functions and report when strings are arguments | |
egrep -r --exclude-dir "node_modules" --include "*.js" --exclude "*.min.*" -e "(setInterval|setTimeout|new(\s*)Function)(\s*)\((\s*)\".*\"" . |
domain | |
123rf.com | |
1stdibs.com | |
2u.com | |
ba.com | |
babylist.com | |
bananatag.com | |
baylor.edu | |
bbcgoodfood.com | |
bcm.edu |
Command injection vulnerability was identified in NPM package rising version 1.0.2
Resources:
[ | |
"express", | |
"afnan" | |
] |
#!/bin/bash | |
filename=$1 | |
output_str="(" | |
while read -r line; do | |
output_str+="ip.src eq $line) or (" | |
done < "$filename" | |
output_str=${output_str% or (*} |
import requests | |
import sys | |
import json | |
import concurrent.futures | |
output_file = open("emails_res.txt", "w") | |
def Emails(package): | |
req = requests.get("https://api.npms.io/v2/package/{}".format(package)) |
a | |
a-- | |
A- | |
a0 | |
a0-tzmigration-ruby | |
a1 | |
a11n | |
A_123 | |
a1330ks_bmi | |
a13g |
.aaa | |
.aarp | |
.abarth | |
.abb | |
.abbott | |
.abbvie | |
.abc | |
.able | |
.abogado | |
.abudhabi |
# Coded by Geekink | |
#!/usr/bin/env python3 | |
import urllib.request | |
import sqlite3 | |
import os.path | |
import re | |
import math |
<?php | |
/* Plugin Name: Damn Vulnerable WordPress Plugin | |
* Description: Intentionally vulnerable plugin for plugin author education | |
* Version: 0.1 | |
* Plugin URI: http://make.wordpress.org/plugins/2013/04/09/intentionally-vulnerable-plugin/ | |
* Author: Jon Cave | |
* Author URI: http://joncave.co.uk | |
* License: GPLv2+ | |
* | |
* DO NOT RUN THIS PLUGIN ON AN INTERNET ACCESSIBLE SITE |