Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4r4m-hjwj-43p8

Опубликовано: 18 фев. 2019
Источник: github
Github: Прошло ревью
CVSS3: 5.9

Описание

Insecure Defaults Allow MITM Over TLS in engine.io-client

Affected versions of engine.io-client do not verify certificates by default, and as such may be vulnerable to Man-in-the-Middle attacks.

The vulnerability is related to the way that node.js handles the rejectUnauthorized setting. If the value is something that evaluates to false, such as undefined or null, certificate verification will be disabled.

Recommendation

Update to version 1.6.9 or later.

If you are unable to upgrade, ensure all calls to socket.io to have a rejectedUnauthorized: true flag.

Пакеты

Наименование

engine.io-client

npm
Затронутые версииВерсия исправления

< 1.6.9

1.6.9

EPSS

Процентиль: 45%
0.00225
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-300

Связанные уязвимости

CVSS3: 5.9
nvd
больше 7 лет назад

engine.io-client is the client for engine.io, the implementation of a transport-based cross-browser/cross-device bi-directional communication layer for Socket.IO. The vulnerability is related to the way that node.js handles the `rejectUnauthorized` setting. If the value is something that evaluates to false, certificate verification will be disabled. This is problematic as engine.io-client 1.6.8 and earlier passes in an object for settings that includes the rejectUnauthorized property, whether it has been set or not. If the value has not been explicitly changed, it will be passed in as `null`, resulting in certificate verification being turned off.

EPSS

Процентиль: 45%
0.00225
Низкий

5.9 Medium

CVSS3

Дефекты

CWE-300