Miggo Logo

CVE-2016-10658: Downloads Resources over HTTP in native-opencv

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.72638%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
native-opencvnpm<= 3.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure HTTP downloads during package installation, likely occurring in post-install scripts or binary fetching logic. However, without access to the package's source code, commit diffs, or specific function implementations (all explicitly noted as unavailable in the provided data), we cannot definitively identify the exact vulnerable functions or their file paths. The advisory describes the vulnerability at the package/installation process level but provides no implementation details required to pinpoint specific functions with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `n*tiv*-op*n*v` ins**ur*ly *ownlo** *n *x**ut**l* ov*r *n un*n*rypt** *TTP *onn**tion. In s**n*rios w**r* *n *tt**k*r **s * privil**** n*twork position, it is possi*l* to int*r**pt t** r*spons* *n* r*pl*** t** *x**ut**l* wit* *

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* *TTP *ownlo**s *urin* p**k*** inst*ll*tion, lik*ly o**urrin* in post-inst*ll s*ripts or *in*ry **t**in* lo*i*. *ow*v*r, wit*out ****ss to t** p**k***'s sour** *o**, *ommit *i**s, or sp**i*i* `*un*tion impl*m*nt*t