
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2022-23812 affects the node-ipc package, versions 10.1.1 to 10.1.3. This package contained malicious code, known as 'protestware', that specifically targeted users with IP addresses located in Russia or Belarus. The vulnerability was discovered and disclosed in March 2022, affecting the popular NPM package which is used for local and remote inter-process communication with over 1.1 million weekly downloads (Orca Security, Hacker News).
The vulnerability is rated with a CVSS score of 9.8 (Critical). The malicious code was implemented in the 'ssl-geospec.js' file located in the 'dao' folder. Upon installation, the package would use the ipgeolocation service to determine the user's location. If the user was detected to be in Russia or Belarus, the code would execute a function that would overwrite files with a heart emoji (❤️). In versions 11.0.0 and later, instead of containing direct malicious code, the package imports a module called 'peacenotwar' that includes potentially undesired behavior (Orca Security, Snyk).
The successful exploitation of this vulnerability could lead to the disclosure of sensitive information, addition or modification of data, or Denial of Service (DoS). For affected users in the targeted regions, the malicious code could result in the corruption of their file system by overwriting files with a heart emoji (NetApp Security).
The recommended mitigation is to upgrade node-ipc to version 10.1.3 or higher. However, users should note that versions 11.0.0 and above still include the 'peacenotwar' module, which, while less destructive, still includes potentially undesired behavior. For complete mitigation, users are advised to pin their dependency to a secure version like 9.2.1 (Orca Security).
The incident sparked significant controversy in the open-source community, particularly as node-ipc is a dependency in popular frameworks like Vue.js. Vue.js CLI users made urgent requests to the project's maintainers to pin the node-ipc requirement to a safe version. NPM reportedly took down versions 10.1.1 and 10.1.2 within 24 hours of publication due to their destructive nature (Orca Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."