Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWczeHAtdjJmZi14NWMz
Downloads Resources over HTTP in go-ipfs-dep
Affected versions of go-ipfs-deps
insecurely download resources over HTTP.
In scenarios where an attacker has a privileged network position, they can modify or read such resources at will. While the exact severity of impact for a vulnerability like this is highly variable and depends on the behavior of the package itself, it ranges from being able to read sensitive information all the way up to and including remote code execution.
Recommendation
Update to version 0.4.4 or later.
Permalink: https://github.com/advisories/GHSA-g3xp-v2ff-x5c3JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWczeHAtdjJmZi14NWMz
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 6 years ago
Updated: almost 2 years ago
EPSS Percentage: 0.00159
EPSS Percentile: 0.5353
Identifiers: GHSA-g3xp-v2ff-x5c3, CVE-2016-10563
References:
- https://nvd.nist.gov/vuln/detail/CVE-2016-10563
- https://github.com/diasdavid/go-ipfs-dep/pull/12
- https://github.com/advisories/GHSA-g3xp-v2ff-x5c3
- https://www.npmjs.com/advisories/156
Blast Radius: 0.0
Affected Packages
npm:go-ipfs-dep
Dependent packages: 62Dependent repositories: 246
Downloads: 137 last month
Affected Version Ranges: < 0.4.4
Fixed in: 0.4.4
All affected versions: 0.4.0, 0.4.1, 0.4.2, 0.4.3
All unaffected versions: 0.4.4, 0.4.5, 0.4.7, 0.4.9, 0.4.10, 0.4.11, 0.4.13, 0.4.14, 0.4.15, 0.4.16, 0.4.17, 0.4.18, 0.4.19, 0.4.20, 0.4.21, 0.4.22, 0.4.23, 0.5.0, 0.5.1, 0.6.0, 0.7.0