GHSA-856X-CP3Q-47VG
Vulnerability from github – Published: 2019-02-18 23:58 – Updated: 2020-08-31 18:10
VLAI?
Summary
Insecure Default Configuration in airbrake
Details
Affected versions of airbrake default to sending environment variables over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible for them to capture and read these environment variables, which may result in leaking sensitive information.
Recommendation
Update to version 0.4.0 or later, or upgrade from the now-deprecated airbrake module to its replacement, airbrake-js.
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "airbrake"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.4.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2016-10530"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2020-06-16T21:24:24Z",
"nvd_published_at": null,
"severity": "MODERATE"
},
"details": "Affected versions of `airbrake` default to sending environment variables over an unencrypted HTTP connection. In scenarios where an attacker has a privileged network position, it is possible for them to capture and read these environment variables, which may result in leaking sensitive information.\n\n\n## Recommendation\n\nUpdate to version 0.4.0 or later, or upgrade from the now-deprecated `airbrake` module to its replacement, [`airbrake-js`](https://www.npmjs.com/package/airbrake-js).",
"id": "GHSA-856x-cp3q-47vg",
"modified": "2020-08-31T18:10:42Z",
"published": "2019-02-18T23:58:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2016-10530"
},
{
"type": "WEB",
"url": "https://github.com/airbrake/node-airbrake/issues/70"
},
{
"type": "ADVISORY",
"url": "https://github.com/advisories/GHSA-856x-cp3q-47vg"
},
{
"type": "WEB",
"url": "https://www.npmjs.com/advisories/96"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Insecure Default Configuration in airbrake"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…