1
0
mirror of https://github.com/swisskyrepo/PayloadsAllTheThings.git synced 2025-04-10 04:03:30 +02:00
PayloadsAllTheThings/Dependency Confusion
2025-03-26 16:22:53 +01:00
..
README.md Markdown Linting - CSV, CVE, DBS, LFI, GWT, GraphQL 2025-03-26 16:22:53 +01:00

Dependency Confusion

A dependency confusion attack or supply chain substitution attack occurs when a software installer script is tricked into pulling a malicious code file from a public repository instead of the intended file of the same name from an internal repository.

Summary

Tools

  • visma-prodsec/confused - Tool to check for dependency confusion vulnerabilities in multiple package management systems
  • synacktiv/DepFuzzer - Tool used to find dependency confusion or project where owner's email can be takeover.

Methodology

Look for npm, pip, gem packages, the methodology is the same : you register a public package with the same name of private one used by the company and then you wait for it to be used.

  • DockerHub: Dockerfile image
  • JavaScript (npm): package.json
  • MVN (maven): pom.xml
  • PHP (composer): composer.json
  • Python (pypi): requirements.txt

NPM Example

References