webPromedium
Lab 380 — BuildStream — RCE via Malicious npm Package Preinstall Script
hackadvisor
Task: CI/CD platform with internal npm registry where a project depends on a package not yet published. Solution: publish a malicious package with a preinstall script that reads /flag, then trigger the build pipeline to execute it and retrieve the flag from build logs.
$ ls tags/ techniques/
dependency_confusion_attacknpm_lifecycle_script_abusecicd_pipeline_exploitationunclaimed_package_hijacking
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [web][Pro]Lab 312 — BuildStream — Zip Slip Path Traversal in Artifact Upload— hackadvisor
- [web][Pro]Lab 122 — BuildStream — RCE via Expression Sandbox Escape— hackadvisor
- [web][Pro]Lab 320 — BuildForge — Path Traversal to RCE via CLI @File Expansion— hackadvisor
- [web][Pro]Lab 209 — BuildForge — Path Traversal in Static File Serving— hackadvisor
- [web][Pro]Lab 29 — PackForge — Path Traversal to RCE via Template Injection— hackadvisor