Miggo Logo

CVE-2016-10663: wixtoolset downloads Resources over HTTP

8.1

CVSS Score
3.1

Basic Information

EPSS Score
0.72666%
Published
2/18/2019
Updated
9/12/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
wixtoolsetnpm<= 1.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insecure HTTP downloads of executables in wixtoolset, but the provided information contains no actual code examples, commit diffs, or specific file paths. The advisory and CVE description only reference the package-level behavior without identifying concrete functions. While the vulnerability clearly exists at the network transport layer (HTTP vs HTTPS), there's insufficient technical detail to confidently map this to specific function implementations within the package. The lack of source code references, patch information, and detailed vulnerability documentation makes it impossible to identify vulnerable functions with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*****t** v*rsions o* `wixtools*t` ins**ur*ly *ownlo** *n *x**ut**l* ov*r *n un*n*rypt** *TTP *onn**tion. In s**n*rios w**r* *n *tt**k*r **s * privil**** n*twork position, it is possi*l* to int*r**pt t** r*spons* *n* r*pl*** t** *x**ut**l* wit* * m*

Reasoning

T** vuln*r**ility st*ms *rom ins**ur* *TTP *ownlo**s o* *x**ut**l*s in wixtools*t, *ut t** provi*** in*orm*tion *ont*ins no **tu*l *o** *x*mpl*s, *ommit *i**s, or sp**i*i* *il* p*t*s. T** **visory *n* *V* **s*ription only r***r*n** t** p**k***-l*v*l