co-cli-installer downloads the co-cli module as part of the install process, but does so over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0232 | co-cli-installer downloads the co-cli module as part of the install process, but does so over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. |
Github GHSA |
GHSA-5rm3-qhxf-rh3r | Downloads Resources over HTTP in co-cli-installer |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://nodesecurity.io/advisories/268 |
|
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T03:34:22.989Z
Reserved: 2017-10-29T00:00:00
Link: CVE-2016-10657
No data.
Status : Modified
Published: 2018-06-04T16:29:01.343
Modified: 2024-11-21T02:44:27.433
Link: CVE-2016-10657
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA