First published: Thu Jun 07 2018(Updated: )
The `jquey` package is malware that attempts to discover and exfiltrate sensitive data such as a user's private SSH key and bash history, sending them to attacker controlled locations. All versions have been unpublished from the npm registry. ## Recommendation If you have found `jquey` installed in your environment, you should: 1. Delete the package 2. Clear your npm cache 3. Ensure it is not present in any other package.json files on your system 4. Regenerate your SSH keys, registry credentials, tokens, and any other sensitive credentials that may have been present in your bash history. Additionally, any service which may have been exposed via credentials in your bash history or accessible via your ssh keys, such as a database, should be reviewed for indicators of compromise as well.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
npm/jquey | =1.0.1 | |
jQuery | =1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16204 is considered a critical vulnerability due to its potential to exfiltrate sensitive user data.
To fix CVE-2017-16204, immediately remove the `jquey` package from your application and any dependent projects.
CVE-2017-16204 affects the `jquey` package version 1.0.1 installed via npm.
CVE-2017-16204 can exfiltrate sensitive data such as a user's private SSH key and bash history.
No, all versions of the `jquey` package, including 1.0.1, have been unpublished from the npm registry.