Severity |
|
Remote |
|
Type |
- |
Unknown |
+ |
Man-in-the-middle |
|
Description |
+ |
In Nimble before version 0.13.0, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform man-in-the-middle (MitM) can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution. |
|
References |
+ |
https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx |
+ |
https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ |
+ |
https://github.com/nim-lang/nimble/commit/b60b6f8d5832c7393676ba7bcd0e07d293cec738 |
|
Notes |
|