Description
co-cli-installer downloads the co-cli module as part of the install process, but does so over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
Published: 2018-06-04
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-0232 co-cli-installer downloads the co-cli module as part of the install process, but does so over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
Github GHSA Github GHSA GHSA-5rm3-qhxf-rh3r Downloads Resources over HTTP in co-cli-installer
References
History

No history.

Subscriptions

Co-cli-installer Project Co-cli-installer
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-09-17T03:34:22.989Z

Reserved: 2017-10-29T00:00:00.000Z

Link: CVE-2016-10657

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-04T16:29:01.343

Modified: 2024-11-21T02:44:27.433

Link: CVE-2016-10657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses