Miggo Logo

CVE-2016-10600: Downloads Resources over HTTP in webrtc-native

9.3

CVSS Score

Basic Information

EPSS Score
0.66847%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
Package NameEcosystemVulnerable VersionsFirst Patched Version
webrtc-nativenpm<= 1.4.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability explicitly involves insecure HTTP downloads of a precompiled binary during installation. While the exact function name and file path are not provided in the advisories, Node.js packages typically handle such downloads via installation scripts (e.g., postinstall hooks in package.json calling a script like install.js). The function performing the HTTP download would use insecure protocols (http://) instead of HTTPS. The confidence is high because the vulnerability's root cause (HTTP download) is unambiguous, even if the exact code location isn't explicitly documented.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `w**rt*-n*tiv*` ins**ur*ly *ownlo** *n *x**ut**l* ov*r *n un*n*rypt** *TTP *onn**tion. In s**n*rios w**r* *n *tt**k*r **s * privil**** n*twork position, it is possi*l* to int*r**pt t** r*spons* *n* r*pl*** t** *x**ut**l* wit* *

Reasoning

T** vuln*r**ility *xpli*itly involv*s ins**ur* *TTP *ownlo**s o* * pr**ompil** *in*ry *urin* inst*ll*tion. W*il* t** *x**t *un*tion n*m* *n* *il* p*t* *r* not provi*** in t** **visori*s, No**.js p**k***s typi**lly **n*l* su** *ownlo**s vi* inst*ll*ti