GHSA-h6m3-cx24-9626: Malicious Package in js-sla3
9.8
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
9/3/2020
Updated
1/9/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
js-sla3 | npm | >= 0.0.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The advisory describes embedded malicious code (CWE-506) but provides no source code, commit diffs, or specific function names. While the attack pattern suggests Ethereum transaction-related functions would be involved (e.g., wallet interaction or transaction signing), the lack of concrete technical details about the package's implementation makes it impossible to identify specific vulnerable functions with high confidence. Malicious behavior could be implemented in install scripts, runtime hooks, or obfuscated code not directly exposed through function APIs.