Rapid Response: Finding NPM libs 'colors' and 'faker'

by

On January 9, 2022, journalist and researcher Ax Sharma wrote an article, "Dev corrupts NPM libs 'colors' and 'faker' breaking thousands of apps".

From Ax

Users of popular open-source libraries 'colors' and 'faker' were left stunned after they saw their applications, using these libraries, printing gibberish data and breaking. Some surmised if the NPM libraries had been compromised, but it turns out there's much more to the story.

The developer of these libraries intentionally introduced an infinite loop that bricked thousands of projects that depend on 'colors' and 'faker.' 

The colors library receives over 20 million weekly downloads on npm alone and has almost 19,000 projects relying on it. Whereas, faker receives over 2.8 million weekly downloads on npm, and has over 2,500 dependents.

JupiterOne response to our clients

We have created a set of J1 queries for our customers to quickly find if they are using the affected libraries. If you aren't using J1 yet, you can get a free lifetime license and run the queries immediately. 

To ingest NPM dependency data into your graph, you could use the npm-inventory script from our secops-automation-examples repo.

Find vulnerable 'faker' packages

This query searches for known-vulnerable npm 'faker' packages:

Find npm_package
with displayName='faker'
that USES as u CodeRepo
where u.version='6.6.6'
return TREE

 

Find vulnerable 'colors' packages

This query searches for known-vulnerable npm 'faker' packages:

Find npm_package
with displayName='colors'
that USES as useRelationship CodeRepo
WHERE useRelationship.version = ('1.4.2' OR '1.4.1' OR '1.4.44-liberty-2')
return TREE

 

If you'd like to be notified as more Rapid-Response announcements are created, please sign up for the newsletter. 

JupiterOne Team
JupiterOne Team

The JupiterOne Team is a diverse set of engineers and developers who are working on the next generation of cyber asset visibility and monitoring.

Keep Reading

Better Together: CMDB + CSPM = Cloud Native Cyber Asset Management
September 4, 2024
Blog
Better Together: CMDB + CSPM = Cloud Native Cyber Asset Management

There is a lot of confusion out there when it comes to cloud native IT and cloud security tools. Things have gotten rather complicated over the last few years as we

Top Takeaways From the Cyentia Institute’s Inaugural Study of EPSS Data and Performance - "A VISUAL EXPLORATION OF EXPLOITATION IN THE WILD"
July 30, 2024
Blog
Top Takeaways From the Cyentia Institute’s Inaugural Study of EPSS Data and Performance

A CISO's Top 6 Takeaways From the Cyentia Institute’s Inaugural Study of EPSS Data and Performance "A Visual Exploration of Exploitation in the Wild"

Open Source Compliance, Endpoint and Vulnerability Management with Fleet | JupiterOne
July 24, 2024
Blog
Open Source Compliance, Endpoint and Vulnerability Management with Fleet

Here’s how Fleet integrates with JupiterOne to gain comprehensive insights and enhance the security in our environment.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.

15 Mar 2022
Blog
One line headline, one line headline

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud eiut.