Miggo Logo

CVE-2017-16126: Tracking Module in botbait

5.3

CVSS Score
3.0

Basic Information

EPSS Score
0.46044%
Published
9/1/2020
Updated
2/6/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
botbaitnpm>= 0.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

While exact function names/paths aren't disclosed in available resources, the vulnerability fundamentally exists in two core behaviors: 1) Accessing Node.js runtime properties (process.versions, process.platform) to collect system information 2) Network operations to gather source IP and transmit collected data. These operations inherently require functions interacting with process object and network APIs, making their implementing functions vulnerable by design. High confidence stems from the explicit data elements listed in the advisory matching standard Node.js environment properties and network tracking patterns.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** mo*ul* `*ot**it` is * tool to ** us** to tr**k *ot *n* *utom*t** tools us*** wit*-in t** npm **osyst*m. `*ot**it` is known to r**or* *n* tr**k us*r in*orm*tion. T** mo*ul* tr**ks t** *ollowin* in*orm*tion. - Sour** IP - pro**ss.v*rsions - pro**

Reasoning

W*il* *x**t *un*tion n*m*s/p*t*s *r*n't *is*los** in *v*il**l* r*sour**s, t** vuln*r**ility *un**m*nt*lly *xists in two *or* ****viors: *) ****ssin* No**.js runtim* prop*rti*s (pro**ss.v*rsions, pro**ss.pl*t*orm) to *oll**t syst*m in*orm*tion *) N*tw