CVE-2018-6333:
Nuclide Improper Input Validation
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
5/13/2022
Updated
7/21/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
nuclide | npm | < 0.290.0 | 0.290.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the hhvm-attach deep link handler in main.js where hostname validation was missing. The commit diff shows the addition of a regex check ([^A-Za-z0-9-._]) to validate hostnames, which was absent in vulnerable versions. The affected code path involves retrieving the hostname via nuclideUri.getHostname() and immediately using it for remote URI construction without validation, making this handler the clear injection point.