CVE-2021-21373

Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*
cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:48

Type Values Removed Values Added
CVSS v2 : 4.3
v3 : 5.9
v2 : 4.3
v3 : 7.5
References () https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ - Exploit, Third Party Advisory () https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ - Exploit, Third Party Advisory
References () https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130 - Release Notes, Third Party Advisory () https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130 - Release Notes, Third Party Advisory
References () https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8 - Third Party Advisory () https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8 - Third Party Advisory

Information

Published : 2021-03-26 22:15

Updated : 2024-11-21 05:48


NVD link : CVE-2021-21373

Mitre link : CVE-2021-21373

CVE.ORG link : CVE-2021-21373


JSON object : View

Products Affected

nim-lang

  • nim
CWE
CWE-348

Use of Less Trusted Source

CWE-295

Improper Certificate Validation