Http-signature is a "Reference implementation of Joyent's HTTP Signature Scheme". In versions <=0.9.11, http-signature signs only the header values, but not the header names. This makes http-signature vulnerable to header forgery. Thus, if an attacker can intercept a request, he can swap header names and change the meaning of the request without changing the signature.
CVE-2017-16005 - High Severity Vulnerability
Vulnerable Library - http-signature-0.9.11.tgz
Reference implementation of Joyent's HTTP Signature Scheme
Library home page: https://registry.npmjs.org/http-signature/-/http-signature-0.9.11.tgz
Path to dependency file: /package.json
Path to vulnerable library: /node_modules/wd/node_modules/http-signature/package.json
Dependency Hierarchy: - wd-0.1.4.tgz (Root Library) - request-2.21.0.tgz - :x: **http-signature-0.9.11.tgz** (Vulnerable Library)
Found in HEAD commit: c3fa8c2bf9d19e66fc9420d6f1ec1f1e32eb3ce3
Found in base branch: master
Vulnerability Details
Http-signature is a "Reference implementation of Joyent's HTTP Signature Scheme". In versions <=0.9.11, http-signature signs only the header values, but not the header names. This makes http-signature vulnerable to header forgery. Thus, if an attacker can intercept a request, he can swap header names and change the meaning of the request without changing the signature.
Publish Date: 2018-06-04
URL: CVE-2017-16005
CVSS 3 Score Details (7.5)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-16005
Release Date: 2018-06-04
Fix Resolution (http-signature): 0.10.0
Direct dependency fix Resolution (wd): 0.2.10