Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h8mc-42c3-r72p

Опубликовано: 24 июл. 2018
Источник: github
Github: Прошло ревью

Описание

hubl-server downloads resources over HTTP

Affected versions of hubl-server insecurely download dependencies over an unencrypted HTTP connection.

In scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running hubl-server.

Recommendation

No patch is currently available for this vulnerability, and it has not seen any updates since 2015.

The best mitigation is currently to avoid using this package, using a different package if available.

Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo

Пакеты

Наименование

hubl-server

npm
Затронутые версииВерсия исправления

<= 1.1.5

Отсутствует

EPSS

Процентиль: 39%
0.00177
Низкий

Дефекты

CWE-311

Связанные уязвимости

CVSS3: 8.1
nvd
больше 7 лет назад

The hubl-server module is a wrapper for the HubL Development Server. During installation hubl-server downloads a set of dependencies from api.hubapi.com. It appears in the code that these files are downloaded over HTTPS however the api.hubapi.com endpoint redirects to a HTTP url. Because of this behavior an attacker with the ability to man-in-the-middle a developer or system performing a package installation could compromise the integrity of the installation.

EPSS

Процентиль: 39%
0.00177
Низкий

Дефекты

CWE-311