CVE-2017-16005
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Http-signature is a "Reference implementation of Joyent's HTTP Signature Scheme". In versions <=0.9.11, http-signature signs only the header values, but not the header names. This makes http-signature vulnerable to header forgery. Thus, if an attacker can intercept a request, he can swap header names and change the meaning of the request without changing the signature.
Http-signature es una "implementación de referencia del esquema de firmas HTTP de Joyent". En las versiones iguales o anteriores a la 0.9.11, http-signature solo firma los valores de cabecera, pero no los nombres de cabecera. Esto hace que http-signature sea vulnerable a falsificación de cabeceras. Así, si un atacante puede interceptar una petición, puede cambiar los nombres de cabecera y cambiar el significado de la petición sin cambiar la firma.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-10-29 CVE Reserved
- 2018-06-04 CVE Published
- 2024-03-05 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-347: Improper Verification of Cryptographic Signature
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://nodesecurity.io/advisories/318 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/joyent/node-http-signature/issues/10 | 2019-10-09 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Joyent Search vendor "Joyent" | Http-signature Search vendor "Joyent" for product "Http-signature" | <= 0.9.11 Search vendor "Joyent" for product "Http-signature" and version " <= 0.9.11" | node.js |
Affected
|