mal-2024-2348
Vulnerability from ossf_malicious_packages
Published
2024-06-25 12:42
Modified
2025-06-18 15:07
Summary
Malicious code in example-arc-server-request-local (npm)
Details

-= Per source details. Do not edit below this line.=-

Source: ossf-package-analysis (f47e48a4969642e3e6ab7d39b5d8f25a7a6d7acf2bbeec054888cfeada839219)

The OpenSSF Package Analysis project identified 'example-arc-server-request-local' @ 100.0.1 (npm) as malicious.

It is considered malicious because:

  • The package executes one or more commands associated with malicious behavior.



{
  "affected": [
    {
      "package": {
        "ecosystem": "npm",
        "name": "example-arc-server-request-local",
        "purl": "pkg:npm/example-arc-server-request-local"
      },
      "versions": [
        "7.999.1",
        "100.0.1",
        "100.0.2"
      ]
    }
  ],
  "credits": [
    {
      "contact": [
        "https://github.com/ossf/package-analysis",
        "https://openssf.slack.com/channels/package_analysis"
      ],
      "name": "OpenSSF: Package Analysis",
      "type": "FINDER"
    },
    {
      "contact": [
        "https://www.reversinglabs.com"
      ],
      "name": "ReversingLabs",
      "type": "FINDER"
    }
  ],
  "database_specific": {
    "malicious-packages-origins": [
      {
        "id": "RLMA-2024-00990",
        "import_time": "2024-06-28T02:43:12.010286192Z",
        "modified_time": "2024-06-25T12:42:19Z",
        "sha256": "5dd3b4899189b768f645ff73ba3f98caca313f5aaf3b3f3ab51a2bbe6d55c795",
        "source": "reversing-labs",
        "versions": [
          "7.999.1"
        ]
      },
      {
        "id": "RLUA-2024-06540",
        "import_time": "2024-10-24T00:57:49.096774259Z",
        "modified_time": "2024-10-16T12:51:38Z",
        "sha256": "f2c4d6d813319bc5fc31c8c93d74e5242db82db28acbb2ef4f1ed159986cba8d",
        "source": "reversing-labs"
      },
      {
        "import_time": "2025-05-19T00:26:17.456979867Z",
        "modified_time": "2025-05-18T21:28:42Z",
        "sha256": "f47e48a4969642e3e6ab7d39b5d8f25a7a6d7acf2bbeec054888cfeada839219",
        "source": "ossf-package-analysis",
        "versions": [
          "100.0.1"
        ]
      },
      {
        "import_time": "2025-05-19T00:26:18.07039733Z",
        "modified_time": "2025-05-18T22:22:11Z",
        "sha256": "f823e9d8679a01573d766f96d92f455f3be1af4dac2463553e7e1c7b0700ba02",
        "source": "ossf-package-analysis",
        "versions": [
          "100.0.2"
        ]
      },
      {
        "id": "RLUA-2025-03191",
        "import_time": "2025-06-18T15:06:48.009069268Z",
        "modified_time": "2025-06-18T10:28:00Z",
        "sha256": "c1bdc188f03086f5e2ee58e2656e25a164a44a35a90e6cc3c49156133b6792ae",
        "source": "reversing-labs",
        "versions": [
          "100.0.2",
          "100.0.1"
        ]
      }
    ]
  },
  "details": "\n---\n_-= Per source details. Do not edit below this line.=-_\n\n## Source: ossf-package-analysis (f47e48a4969642e3e6ab7d39b5d8f25a7a6d7acf2bbeec054888cfeada839219)\nThe OpenSSF Package Analysis project identified \u0027example-arc-server-request-local\u0027 @ 100.0.1 (npm) as malicious.\n\nIt is considered malicious because:\n\n- The package executes one or more commands associated with malicious behavior.\n",
  "id": "MAL-2024-2348",
  "modified": "2025-06-18T15:07:35Z",
  "published": "2024-06-25T12:42:19Z",
  "schema_version": "1.5.0",
  "summary": "Malicious code in example-arc-server-request-local (npm)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…