Description
Affected versions of baryton-saxophone insecurely download an executable over an unencrypted HTTP connection.
In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running baryton-saxophone.
Recommendation
Update the baryton-saxophone package to the latest compatible version. Followings are version details:
- Affected version(s): < 3.0.1
- Patched version(s): 3.0.1
References
Related Issues
- Downloads Resources over HTTP in alto-saxophone - CVE-2016-10694
- Downloads Resources over HTTP in product-monitor - CVE-2016-10567
- Downloads Resources over HTTP in wasdk - CVE-2016-10587
- Downloads Resources over HTTP in limbus-buildgen - CVE-2016-10674
- Tags:
- npm
- baryton-saxophone
Anything's wrong? Let us know Last updated on January 09, 2023