Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6cf6-8hvr-r68w

Опубликовано: 04 апр. 2024
Источник: github
Github: Прошло ревью
CVSS3: 8.2

Описание

dectalk-tts Uses Unencrypted HTTP Request

Impact

In dectalk-tts@1.0.0, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack.

Theft

Because dectalk-tts is a text-to-speech package, user requests are expected to only contain natural language. The package README warns that user input is sent to a third-party API, so users should not send sensitive information regardless.

But if users ignore the warnings and send sensitive information anyway, that information could be stolen by attackers.

Modification

Attackers could manipulate requests to the API. However, the worst a modified request could do is return an incorrect audio file or bad request rejection.

Attackers could also manipulate responses from the API, returning malicious output to the user. Output is expected to be a wav-encoded buffer, which users will likely save to a file. This could be a dangerous entrypoint to the user's filesystem.

Patches

The network request was upgraded to HTTPS in version 1.0.1. No other changes were made, so updating is risk-free.

Workarounds

There are no workarounds, but here are some precautions:

  • Do not send any sensitive information.

  • Carefully verify the API response before saving it.

References

Vulnerable code Original report Patch pull request

Пакеты

Наименование

dectalk-tts

npm
Затронутые версииВерсия исправления

= 1.0.0

1.0.1

EPSS

Процентиль: 17%
0.00055
Низкий

8.2 High

CVSS3

Дефекты

CWE-300
CWE-319
CWE-598

Связанные уязвимости

CVSS3: 8.2
nvd
почти 2 года назад

dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In `dectalk-tts@1.0.0`, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version `1.0.1`. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it.

EPSS

Процентиль: 17%
0.00055
Низкий

8.2 High

CVSS3

Дефекты

CWE-300
CWE-319
CWE-598