samsilentdemo / security-adventure

0 stars 0 forks source link

CVE-2017-16005 (High) detected in http-signature-0.9.11.tgz #26

Open mend-for-github-com[bot] opened 7 months ago

mend-for-github-com[bot] commented 7 months ago

CVE-2017-16005 - High Severity Vulnerability

Vulnerable Library - http-signature-0.9.11.tgz

Reference implementation of Joyent's HTTP Signature Scheme

Library home page: https://registry.npmjs.org/http-signature/-/http-signature-0.9.11.tgz

Path to dependency file: /package.json

Path to vulnerable library: /node_modules/wd/node_modules/http-signature/package.json

Dependency Hierarchy: - wd-0.1.4.tgz (Root Library) - request-2.21.0.tgz - :x: **http-signature-0.9.11.tgz** (Vulnerable Library)

Found in HEAD commit: c3fa8c2bf9d19e66fc9420d6f1ec1f1e32eb3ce3

Found in base branch: master

Vulnerability Details

Http-signature is a "Reference implementation of Joyent's HTTP Signature Scheme". In versions <=0.9.11, http-signature signs only the header values, but not the header names. This makes http-signature vulnerable to header forgery. Thus, if an attacker can intercept a request, he can swap header names and change the meaning of the request without changing the signature.

Publish Date: 2018-06-04

URL: CVE-2017-16005

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-16005

Release Date: 2018-06-04

Fix Resolution (http-signature): 0.10.0

Direct dependency fix Resolution (wd): 0.2.10