CVE-2016-10567

product-monitor is a HTML/JavaScript template for monitoring a product by encouraging product developers to gather all the information about the status of a product, including live monitoring, statistics, endpoints, and test results into one place. product-monitor versions below 2.2.5 download JavaScript resources over HTTP, which leaves the module vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested JavaScript file with an attacker controlled JavaScript file if the attacker is on the network or positioned in between the user and the remote server.
References
Link Resource
https://nodesecurity.io/advisories/171 Third Party Advisory
https://nodesecurity.io/advisories/171 Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:product-monitor_project:product-monitor:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 02:44

Type Values Removed Values Added
References () https://nodesecurity.io/advisories/171 - Third Party Advisory () https://nodesecurity.io/advisories/171 - Third Party Advisory

Information

Published : 2018-05-29 20:29

Updated : 2024-11-21 02:44


NVD link : CVE-2016-10567

Mitre link : CVE-2016-10567

CVE.ORG link : CVE-2016-10567


JSON object : View

Products Affected

product-monitor_project

  • product-monitor
CWE
CWE-311

Missing Encryption of Sensitive Data

CWE-310

Cryptographic Issues