Severity |
|
Remote |
|
Type |
- |
Unknown |
+ |
Man-in-the-middle |
|
Description |
+ |
In Nimble before version 0.13.0, "nimble refresh" fetches a list of Nimble packages over HTTPS by default. In case of error it falls back to a non-TLS URL http://irclogs.nim-lang.org/packages.json. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution. |
|
References |
+ |
https://github.com/nim-lang/security/security/advisories/GHSA-8w52-r35x-rgp8 |
+ |
https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ |
+ |
https://github.com/nim-lang/nimble/commit/aec0ae5c23d2e2a2ec28e97dcb9dd6cb1e68b134 |
|
Notes |
|