Miggo Logo

CVE-2016-10661: Downloads Resources over HTTP in phantomjs-cheniu

9.3

CVSS Score

Basic Information

EPSS Score
0.66847%
Published
2/18/2019
Updated
1/9/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
AV:N/AC:M/Au:N/C:C/I:C/A:C
Package NameEcosystemVulnerable VersionsFirst Patched Version
phantomjs-cheniunpm<= 2.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from downloading executables over HTTP. While no explicit code is provided, npm packages like phantomjs-prebuilt (which this forks) typically implement binary downloads in an install script (install.js). The fork's continued use of HTTP (rather than HTTPS) in this download mechanism matches the described vulnerability pattern. The high confidence comes from the standard implementation patterns in similar packages and the explicit MITM attack vector described in the advisory.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `p**ntomjs-***niu` ins**ur*ly *ownlo** *n *x**ut**l* ov*r *n un*n*rypt** *TTP *onn**tion. In s**n*rios w**r* *n *tt**k*r **s * privil**** n*twork position, it is possi*l* to int*r**pt t** r*spons* *n* r*pl*** t** *x**ut**l* wit

Reasoning

T** vuln*r**ility st*ms *rom *ownlo**in* *x**ut**l*s ov*r *TTP. W*il* no *xpli*it *o** is provi***, `npm` p**k***s lik* `p**ntomjs-pr**uilt` (w*i** t*is *orks) typi**lly impl*m*nt *in*ry *ownlo**s in *n inst*ll s*ript (`inst*ll.js`). T** *ork's *onti