Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTV3NHAtaDRnbS0zdzI2
Downloads Resources over HTTP in jser-stat
Affected versions of jser-stat
insecurely downloads resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
Recommendation
No patch is currently available for this vulnerability.
The best mitigation is currently to avoid using this package, using a different package if available.
Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
Permalink: https://github.com/advisories/GHSA-5w4p-h4gm-3w26JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTV3NHAtaDRnbS0zdzI2
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago
Identifiers: GHSA-5w4p-h4gm-3w26, CVE-2016-10592
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-10592
- https://github.com/advisories/GHSA-5w4p-h4gm-3w26
- https://github.com/jser/stat-js/blob/master/data/url-mapping.js
- https://www.npmjs.com/advisories/188
Blast Radius: 0.0
Affected Packages
npm:jser-stat
Dependent packages: 4Dependent repositories: 1
Downloads: 42 last month
Affected Version Ranges: <= 4.0.3
No known fixed version
All affected versions: 1.0.1, 1.0.2, 1.1.0, 1.1.1, 1.2.0, 1.2.1, 1.2.2, 1.3.0, 1.3.1, 1.4.0, 1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5, 1.5.6, 2.0.0, 2.1.0, 2.1.1, 2.1.2, 2.1.3, 3.0.0, 3.1.0, 4.0.0, 4.0.1, 4.0.2, 4.0.3