Affected versions of closure-util
insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running closure-util
.
To mitigate this issue:
--ignore-scripts
flag.default-config.json
in a text editorcompiler_url
and library_url
to https
equivalentsnpm i
in the package directory.