Miggo Logo

CVE-2016-10630: Downloads Resources over HTTP in install-g-test

4.3

CVSS Score

Basic Information

EPSS Score
0.32812%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
install-g-testnpm<= 2.0.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The provided vulnerability information does not include specific code snippets, commit diffs, or file paths that would allow identification of exact vulnerable functions. The advisory describes the root cause (HTTP downloads) in general terms but lacks implementation details about the package's internal functions. Without access to the package's source code or network-related functions (e.g., HTTP GET implementations, dependency installation routines), we cannot confidently map the vulnerability to specific functions. The CWE-311 classification confirms the cryptographic weakness exists, but function-level attribution requires code analysis that isn't available in the provided data.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `inst*ll-*-t*st` ins**ur*ly *ownlo** r*sour**s ov*r *TTP. In s**n*rios w**r* *n *tt**k*r **s * privil**** n*twork position, t**y **n mo*i*y or r*** su** r*sour**s *t will. W*il* t** *x**t s*v*rity o* imp**t *or * vuln*r**ility

Reasoning

T** provi*** vuln*r**ility in*orm*tion *o*s not in*lu** sp**i*i* *o** snipp*ts, *ommit *i**s, or *il* p*t*s t**t woul* *llow i**nti*i**tion o* *x**t vuln*r**l* *un*tions. T** **visory **s*ri**s t** root **us* (*TTP *ownlo**s) in **n*r*l t*rms *ut l**