Resources Downloaded over Insecure Protocol Affecting broccoli-closure package, versions <1.3.1
Threat Intelligence
EPSS
0.18% (56th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID npm:broccoli-closure:20161101
- published 4 Jan 2017
- disclosed 1 Nov 2016
- credit Adam Baldwin
Introduced: 1 Nov 2016
CVE-2016-10635 Open this link in a new tabHow to fix?
Upgrade to version 1.3.1
or greater.
Overview
broccoli-closure
broccoli-closure is a Closure compiler plugin for Broccoli.
broccoli-closure downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
References
CVSS Scores
version 3.1