Description
arcanist downloads resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2019-0289 | arcanist downloads resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server. |
Github GHSA |
GHSA-g7w9-vm5m-48q8 | Downloads Resources over HTTP in arcanist |
References
| Link | Providers |
|---|---|
| https://nodesecurity.io/advisories/286 |
|
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T01:11:32.095Z
Reserved: 2017-10-29T00:00:00.000Z
Link: CVE-2016-10683
No data.
Status : Modified
Published: 2018-06-04T16:29:02.140
Modified: 2024-11-21T02:44:30.343
Link: CVE-2016-10683
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA