closure-util downloads Resources over HTTP
High severity
GitHub Reviewed
Published
Feb 18, 2019
to the GitHub Advisory Database
•
Updated Sep 8, 2023
Description
Published to the GitHub Advisory Database
Feb 18, 2019
Reviewed
Jun 16, 2020
Last updated
Sep 8, 2023
Affected versions of
closure-utilinsecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running
closure-util.Recommendation
To mitigate this issue:
--ignore-scriptsflag.default-config.jsonin a text editorcompiler_urlandlibrary_urltohttpsequivalentsnpm iin the package directory.References