dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In `dectalk-tts@1.0.0`, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version `1.0.1`. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-1122 dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In `dectalk-tts@1.0.0`, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version `1.0.1`. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it.
Github GHSA Github GHSA GHSA-6cf6-8hvr-r68w dectalk-tts Uses Unencrypted HTTP Request
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-08-26T20:27:25.984Z

Reserved: 2024-03-29T14:16:31.900Z

Link: CVE-2024-31206

cve-icon Vulnrichment

Updated: 2024-08-02T01:46:04.547Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-04T23:15:15.897

Modified: 2024-11-21T09:13:02.270

Link: CVE-2024-31206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses