mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
63 lines
2.1 KiB
JSON
63 lines
2.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "support@hackerone.com",
|
|
"DATE_PUBLIC": "2018-04-26T00:00:00",
|
|
"ID": "CVE-2016-10595",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "jdf-sass node module",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All versions"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "HackerOne"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "jdf-sass is a fork from node-sass, jdf use only. jdf-sass downloads executable resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested file with an attacker controlled file if the attacker is on the network or positioned in between the user and the remote server."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Missing Encryption of Sensitive Data (CWE-311)"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://nodesecurity.io/advisories/198",
|
|
"refsource": "MISC",
|
|
"url": "https://nodesecurity.io/advisories/198"
|
|
}
|
|
]
|
|
}
|
|
} |