Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16005

Опубликовано: 04 июн. 2018
Источник: debian
EPSS Низкий

Описание

Http-signature is a "Reference implementation of Joyent's HTTP Signature Scheme". In versions <=0.9.11, http-signature signs only the header values, but not the header names. This makes http-signature vulnerable to header forgery. Thus, if an attacker can intercept a request, he can swap header names and change the meaning of the request without changing the signature.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-http-signaturenot-affectedpackage

Примечания

  • https://github.com/joyent/node-http-signature/issues/10

  • https://nodesecurity.io/advisories/318

  • nodejs not covered by security support

EPSS

Процентиль: 37%
0.00161
Низкий

Связанные уязвимости

CVSS3: 7.5
redhat
больше 7 лет назад

Http-signature is a "Reference implementation of Joyent's HTTP Signature Scheme". In versions <=0.9.11, http-signature signs only the header values, but not the header names. This makes http-signature vulnerable to header forgery. Thus, if an attacker can intercept a request, he can swap header names and change the meaning of the request without changing the signature.

CVSS3: 7.5
nvd
больше 7 лет назад

Http-signature is a "Reference implementation of Joyent's HTTP Signature Scheme". In versions <=0.9.11, http-signature signs only the header values, but not the header names. This makes http-signature vulnerable to header forgery. Thus, if an attacker can intercept a request, he can swap header names and change the meaning of the request without changing the signature.

CVSS3: 7.5
github
около 7 лет назад

Header Forgery in http-signature

EPSS

Процентиль: 37%
0.00161
Низкий