CVE-2021-21374

Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*
cpe:2.3:a:nim-lang:nim:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:48

Type Values Removed Values Added
References () https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ - Exploit, Third Party Advisory () https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ - Exploit, Third Party Advisory
References () https://github.com/nim-lang/Nim/pull/16940 - Patch, Third Party Advisory () https://github.com/nim-lang/Nim/pull/16940 - Patch, Third Party Advisory
References () https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130 - Release Notes, Third Party Advisory () https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130 - Release Notes, Third Party Advisory
References () https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx - Third Party Advisory () https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx - Third Party Advisory

Information

Published : 2021-03-26 22:15

Updated : 2024-11-21 05:48


NVD link : CVE-2021-21374

Mitre link : CVE-2021-21374

CVE.ORG link : CVE-2021-21374


JSON object : View

Products Affected

nim-lang

  • nim
CWE
CWE-348

Use of Less Trusted Source

CWE-349

Acceptance of Extraneous Untrusted Data With Trusted Data

CWE-599

Missing Validation of OpenSSL Certificate

CWE-295

Improper Certificate Validation