{ "schema_version": "1.4.0", "id": "GHSA-h8mc-42c3-r72p", "modified": "2023-09-06T20:06:02Z", "published": "2018-07-24T15:40:47Z", "aliases": [ "CVE-2017-16035" ], "summary": "hubl-server downloads resources over HTTP", "details": "Affected versions of `hubl-server` insecurely download dependencies over an unencrypted HTTP connection. \n\nIn scenarios where an attacker has a privileged network position, it is possible to intercept the responses and replace the dependencies with malicious ones, resulting in code execution on the system running `hubl-server`.\n\n\n## Recommendation\n\nNo patch is currently available for this vulnerability, and it has not seen any updates since 2015.\n\nThe best mitigation is currently to avoid using this package, using a different package if available. \n\nAlternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised yo", "severity": [], "affected": [ { "package": { "ecosystem": "npm", "name": "hubl-server" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "last_affected": "1.1.5" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16035" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-h8mc-42c3-r72p" }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/334" } ], "database_specific": { "cwe_ids": [ "CWE-311" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:39:31Z", "nvd_published_at": null } }