Miggo Logo

CVE-2016-10565:
Downloads Resources over HTTP in operadriver

6.8

CVSS Score

Basic Information

EPSS Score
-
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
operadrivernpm< 0.2.30.2.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure HTTP downloads of operadriver binaries. The most likely candidate is the function responsible for constructing/downloading these URLs. While exact commit data isn't available, the vulnerability pattern matches common driver installation implementations where URL protocols are hardcoded. The function handling download URL generation (likely named getDownloadUrl or similar in an installation module) would be the point of vulnerability when using HTTP. Confidence is medium due to inference from vulnerability description rather than explicit patch analysis.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

op*r**riv*r is * Op*r* *riv*r *or S*l*nium. op*r**riv*r v*rsions **low *.*.* *ownlo** *in*ry r*sour**s ov*r *TTP, w*i** l**v*s it vuln*r**l* to MITM *tt**ks. It m*y ** possi*l* to **us* r*mot* *o** *x**ution (R**) *y sw*ppin* out t** r*qu*st** *in*

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* *TTP *ownlo**s o* op*r**riv*r *in*ri*s. T** most lik*ly **n*i**t* is t** *un*tion r*sponsi*l* *or *onstru*tin*/*ownlo**in* t**s* URLs. W*il* *x**t *ommit **t* isn't *v*il**l*, t** vuln*r**ility p*tt*rn m*t***s *o