Miggo Logo

CVE-2024-31206:
dectalk-tts Uses Unencrypted HTTP Request

8.2

CVSS Score

Basic Information

EPSS Score
-
Published
4/4/2024
Updated
4/5/2024
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
dectalk-ttsnpm= 1.0.01.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the URL construction in the dectalk function where 'http://tts.cyzon.us/tts' was hardcoded. This is explicitly shown in the commit diff changing the protocol to HTTPS. As this function handles all API communication, its unencrypted request handling directly enables the MITM vulnerability. The function's role in request transmission and the targeted patch confirm its vulnerability.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t In `***t*lk-tts@*.*.*`, n*twork r*qu*sts to t** t*ir*-p*rty *PI *r* s*nt ov*r *TTP, w*i** is un*n*rypt**. Un*n*rypt** tr***i* **n ** **sily int*r**pt** *n* mo*i*i** *y *tt**k*rs. *nyon* w*o us*s t** p**k*** *oul* ** t** vi*tim o* * [m*n-i

Reasoning

T** vuln*r**ility st*ms *rom t** URL *onstru*tion in t** ***t*lk *un*tion w**r* '*ttp://tts.*yzon.us/tts' w*s **r**o***. T*is is *xpli*itly s*own in t** *ommit *i** ***n*in* t** proto*ol to *TTPS. *s t*is *un*tion **n*l*s *ll *PI *ommuni**tion, its u