closure-util downloads Resources over HTTP
High severity
GitHub Reviewed
Published
Feb 18, 2019
to the GitHub Advisory Database
•
Updated Sep 8, 2023
Description
Published to the GitHub Advisory Database
Feb 18, 2019
Reviewed
Jun 16, 2020
Last updated
Sep 8, 2023
Affected versions of
closure-util
insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running
closure-util
.Recommendation
To mitigate this issue:
--ignore-scripts
flag.default-config.json
in a text editorcompiler_url
andlibrary_url
tohttps
equivalentsnpm i
in the package directory.References