CVE-2016-10583 – closure-util
Package
Manager: npm
Name: closure-util
Vulnerable Version: >=0 <=2.0.0-beta.1
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.0164 pctl0.81239
Details
closure-util downloads Resources over HTTP Affected versions of `closure-util` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `closure-util`. ## Recommendation To mitigate this issue: 1. Install the package using npm's `--ignore-scripts` flag. 2. Navigate to the package directory, and open `default-config.json` in a text editor 3. Change the download URLs in the `compiler_url` and `library_url` to `https` equivalents 4. run `npm i` in the package directory.
Metadata
Created: 2019-02-18T23:58:03Z
Modified: 2023-09-08T20:52:07Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/02/GHSA-2hpj-g53m-9gj6/GHSA-2hpj-g53m-9gj6.json
CWE IDs: ["CWE-311"]
Alternative ID: GHSA-2hpj-g53m-9gj6
Finding: F020
Auto approve: 1