Miggo Logo

CVE-2018-6333:
Nuclide Improper Input Validation

9.8

CVSS Score

Basic Information

EPSS Score
-
Published
5/13/2022
Updated
7/21/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
nuclidenpm< 0.290.00.290.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the hhvm-attach deep link handler in main.js where hostname validation was missing. The commit diff shows the addition of a regex check ([^A-Za-z0-9-._]) to validate hostnames, which was absent in vulnerable versions. The affected code path involves retrieving the hostname via nuclideUri.getHostname() and immediately using it for remote URI construction without validation, making this handler the clear injection point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** **vm-*tt*** ***p link **n*l*r in Nu*li** *i* not prop*rly s*nitiz* t** provi*** *ostn*m* p*r*m*t*r w**n r*n**rin*. *s * r*sult, * m*li*ious URL *oul* ** us** to r*n**r *TML *n* ot**r *ont*nt insi** o* t** **itor's *ont*xt, w*i** *oul* pot*nti*lly

Reasoning

T** vuln*r**ility st*ms *rom t** **vm-*tt*** ***p link **n*l*r in m*in.js w**r* *ostn*m* v*li**tion w*s missin*. T** *ommit *i** s*ows t** ***ition o* * r***x ****k ([^*-Z*-z*-*\-._]) to v*li**t* *ostn*m*s, w*i** w*s **s*nt in vuln*r**l* v*rsions. T*