Miggo Logo

CVE-2016-10617: Downloads Resources over HTTP in box2d-native

9.3

CVSS Score

Basic Information

EPSS Score
0.72638%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
Package NameEcosystemVulnerable VersionsFirst Patched Version
box2d-nativenpm<= 0.0.8

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure HTTP downloads during package installation/operation, but the provided information contains no actual code references, commit diffs, or file paths. While the root cause is clearly the use of HTTP for downloading executables, the advisory and CVE details do not specify which functions or installation scripts implement this insecure download mechanism. Without access to the package's source code or installation scripts, we cannot identify specific functions with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `*ox**-n*tiv*` ins**ur*ly *ownlo** *n *x**ut**l* ov*r *n un*n*rypt** *TTP *onn**tion. In s**n*rios w**r* *n *tt**k*r **s * privil**** n*twork position, it is possi*l* to int*r**pt t** r*spons* *n* r*pl*** t** *x**ut**l* wit* *

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* *TTP *ownlo**s *urin* p**k*** inst*ll*tion/op*r*tion, *ut t** provi*** in*orm*tion *ont*ins no **tu*l *o** r***r*n**s, *ommit *i**s, or *il* p*t*s. W*il* t** root **us* is *l**rly t** us* o* *TTP *or *ownlo**in*