Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security Fix for Resources Downloaded over Insecure Protocol - huntr.dev #3

Open
wants to merge 2 commits into
base: master
Choose a base branch
from

Conversation

huntr-helper
Copy link

https://huntr.dev/users/mufeedvh has fixed the Resources Downloaded over Insecure Protocol vulnerability 🔨. mufeedvh has been awarded $25 for fixing the vulnerability through the huntr bug bounty program 💵. Think you could fix a vulnerability like this?

Get involved at https://huntr.dev/

Q | A
Version Affected | ALL
Bug Fix | YES
Original Pull Request | 418sec#1
Vulnerability README | https://github.com/418sec/huntr/blob/master/bounties/npm/node-sfml/1/README.md

User Comments:

📊 Metadata *

Bounty URL: https://www.huntr.dev/bounties/1-npm-node-sfml

⚙️ Description *

The URL to import packages from was hardcoded to use the http version of the domains:

  • kcat.strangesoft.net
  • www.mega-nerd.com
  • sfml.svn.sourceforge.net

💻 Technical Description *

The fix just simply changes the http version to https to mitigate MITM attacks.

🐛 Proof of Concept (PoC) *

sfml is Node v8 Bindings for SFML, this package are vulnerable to Man in the Middle (MitM) attacks due to downloading resources over an insecure protocol.

Without a secure connection, it is possible for an attacker to intercept this connection and alter the packages received. In serious cases, this may even lead to Remote Code Execution (RCE) on your host server.

Ref: https://www.huntr.dev/bounties/1-npm-node-sfml/

🔥 Proof of Fix (PoF) *

Changed all domains with SSL certificates to https in the install file.

Although the domain www.mega-nerd.com doesn't have an SSL certificate making it not possible to use the https version of the domain.

👍 User Acceptance Testing (UAT)

No breaking changes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants