Lucene search

K
githubGitHub Advisory DatabaseGHSA-W364-8VFV-GVF5
HistoryFeb 18, 2019 - 11:44 p.m.

Downloads Resources over HTTP in phantomjs-cheniu

2019-02-1823:44:52
CWE-311
GitHub Advisory Database
github.com
9

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.6%

Affected versions of phantomjs-cheniu insecurely download an executable over an unencrypted HTTP connection.

In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running phantomjs-cheniu.

Recommendation

No patch is currently available for this vulnerability.

As this package is just a fork of Medium’s phantomjs-prebuilt package, the best mitigation is currently to install the Medium version of phantomjs-prebuilt. This can be done via the following command:

npm i phantomjs-prebuilt

Affected configurations

Vulners
Node
phantomjsphantomjsRange2.0.1
CPENameOperatorVersion
phantomjs-cheniule2.0.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

0.002 Low

EPSS

Percentile

54.6%

Related for GHSA-W364-8VFV-GVF5