Miggo Logo

CVE-2016-10616: Downloads Resources over HTTP in openframe-image

6.8

CVSS Score

Basic Information

EPSS Score
0.39308%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
Package NameEcosystemVulnerable VersionsFirst Patched Version
openframe-imagenpm<= 0.2.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided information does not include specific code snippets, commit diffs, or function names from the 'openframe-image' package. While the vulnerability clearly stems from insecure HTTP downloads, the exact functions responsible for initiating these downloads (e.g., HTTP GET requests) cannot be identified with high confidence without access to the package's source code or implementation details. The advisory mentions the general behavior but does not specify which functions are involved.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `op*n*r*m*-im***` ins**ur*ly *ownlo**s r*sour**s ov*r *TTP. In s**n*rios w**r* *n *tt**k*r **s * privil**** n*twork position, t**y **n mo*i*y or r*** su** r*sour**s *t will. W*il* t** *x**t s*v*rity o* imp**t *or * vuln*r**ilit

Reasoning

T** provi*** in*orm*tion *o*s not in*lu** sp**i*i* *o** snipp*ts, *ommit *i**s, or *un*tion n*m*s *rom t** 'op*n*r*m*-im***' p**k***. W*il* t** vuln*r**ility *l**rly st*ms *rom ins**ur* `*TTP` *ownlo**s, t** *x**t *un*tions r*sponsi*l* *or initi*tin*