marionette-socket-host is a marionette-js-runner host for sending actions over a socket. marionette-socket-host downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2018-0384 | marionette-socket-host is a marionette-js-runner host for sending actions over a socket. marionette-socket-host downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server. |
![]() |
GHSA-8wg9-92fr-6j7v | marionette-socket-host downloads Resources over HTTP |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://nodesecurity.io/advisories/252 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T04:14:10.920Z
Reserved: 2017-10-29T00:00:00
Link: CVE-2016-10648

No data.

Status : Modified
Published: 2018-06-04T16:29:00.937
Modified: 2024-11-21T02:44:26.410
Link: CVE-2016-10648

No data.

No data.