logo

CVE-2016-10611 strider-sauce

Package

Manager: npm
Name: strider-sauce
Vulnerable Version: >=0 <=0.6.3

Severity

Level: High

CVSS v3.1: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.00774 pctl0.72701

Details

Downloads Resources over HTTP in strider-sauce Affected versions of `strider-sauce` insecurely download an executable over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `strider-sauce`. ## Recommendation While the package author has created a patch for this vulnerability, they have not yet published it to npm or bumped the version number. In order to resolve the vulnerability, you will need to install the module manually from github: ``` npm install github:Strider-CD/strider-sauce#5ff6d65 ``` As this vulnerability does not have a version bump included with the patch, it is possible that you have received a report for a vulnerable package, yet have installed the patched version and are no longer vulnerable. If that is the case, this advisory can be disregarded.

Metadata

Created: 2019-02-18T23:47:53Z
Modified: 2021-06-11T12:35:08Z
Source: MANUAL
CWE IDs: ["CWE-311"]
Alternative ID: GHSA-8gf4-pcj6-54rp
Finding: F020
Auto approve: 1