closurecompiler

Downloads Resources over HTTP

Severity: high

Overview

Affected versions of closurecompiler insecurely download an executable over an unencrypted HTTP connection.

In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running closurecompiler.

Remediation

This vulnerability was discovered in 2016, and no patched version has been released as of 3/2018.

At this time, the best available mitigation is to use an alternative module that is actively maintained and provides similar functionality. There are multiple modules fitting this criteria available on npm..

Vulnerable versions

0.9.1
5 years ago
0.9.2
5 years ago
0.10.1
5 years ago
1.0.0
5 years ago
1.0.2
5 years ago
1.0.3
5 years ago
1.0.4
5 years ago
1.0.5
5 years ago
1.0.6
5 years ago
1.0.7
5 years ago
1.1.0
5 years ago
1.1.1
5 years ago
1.1.2
5 years ago
1.1.4
5 years ago
1.1.5
5 years ago
1.2.0
5 years ago
1.3.0
5 years ago
1.3.1
4 years ago
1.3.2
4 years ago
1.4.0
4 years ago
1.4.1
4 years ago
1.5.0
4 years ago
1.5.1
4 years ago
1.5.2
3 years ago
1.5.3
2 years ago
1.6.0
2 years ago
1.6.1
2 years ago

Unaffected versions

Advisory timeline

  1. Published

    Advisory published
    Dec 18th, 2016
  2. Reported

    Initial report by Adam Baldwin
    Nov 30th, 2016