Skip to content

pngcrush-installer downloads Resources over HTTP

High severity GitHub Reviewed Published Feb 18, 2019 to the GitHub Advisory Database • Updated Sep 9, 2023

Package

npm pngcrush-installer (npm)

Affected versions

< 1.8.10

Patched versions

1.8.10

Description

Affected versions of pngcrush-installer insecurely download an executable over an unencrypted HTTP connection.

In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running pngcrush-installer.

Recommendation

Update to version 1.8.10 or later.

References

Published to the GitHub Advisory Database Feb 18, 2019
Reviewed Jun 16, 2020
Last updated Sep 9, 2023

Severity

High
8.1
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2016-10570

GHSA ID

GHSA-g93h-75m9-3qq4

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.