Lucene search

K
cve[email protected]CVE-2016-3956
HistoryJul 02, 2016 - 2:59 p.m.

CVE-2016-3956

2016-07-0214:59:19
CWE-200
web.nvd.nist.gov
38
6
cve-2016-3956
cli
npm
node.js
http
security vulnerability

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

61.9%

The CLI in npm before 2.15.1 and 3.x before 3.8.3, as used in Node.js 0.10 before 0.10.44, 0.12 before 0.12.13, 4 before 4.4.2, and 5 before 5.10.0, includes bearer tokens with arbitrary requests, which allows remote HTTP servers to obtain sensitive information by reading Authorization headers.

Affected configurations

NVD
Node
ibmsdkRange1.1.0.20nodejs
OR
ibmsdkRange1.2.0.10nodejs
OR
ibmsdkRange4.4.1.0nodejs
Node
nodejsnode.jsMatch0.10.0
OR
nodejsnode.jsMatch0.10.1
OR
nodejsnode.jsMatch0.10.2
OR
nodejsnode.jsMatch0.10.3
OR
nodejsnode.jsMatch0.10.4
OR
nodejsnode.jsMatch0.10.5
OR
nodejsnode.jsMatch0.10.6
OR
nodejsnode.jsMatch0.10.7
OR
nodejsnode.jsMatch0.10.8
OR
nodejsnode.jsMatch0.10.9
OR
nodejsnode.jsMatch0.10.10
OR
nodejsnode.jsMatch0.10.11
OR
nodejsnode.jsMatch0.10.12
OR
nodejsnode.jsMatch0.10.13
OR
nodejsnode.jsMatch0.10.14
OR
nodejsnode.jsMatch0.10.15
OR
nodejsnode.jsMatch0.10.16
OR
nodejsnode.jsMatch0.10.16-isaacs-manual
OR
nodejsnode.jsMatch0.10.17
OR
nodejsnode.jsMatch0.10.18
OR
nodejsnode.jsMatch0.10.19
OR
nodejsnode.jsMatch0.10.20
OR
nodejsnode.jsMatch0.10.21
OR
nodejsnode.jsMatch0.10.22
OR
nodejsnode.jsMatch0.10.23
OR
nodejsnode.jsMatch0.10.24
OR
nodejsnode.jsMatch0.10.25
OR
nodejsnode.jsMatch0.10.26
OR
nodejsnode.jsMatch0.10.27
OR
nodejsnode.jsMatch0.10.28
OR
nodejsnode.jsMatch0.10.29
OR
nodejsnode.jsMatch0.10.30
OR
nodejsnode.jsMatch0.10.31
OR
nodejsnode.jsMatch0.10.32
OR
nodejsnode.jsMatch0.10.33
OR
nodejsnode.jsMatch0.10.34
OR
nodejsnode.jsMatch0.10.35
OR
nodejsnode.jsMatch0.10.36
OR
nodejsnode.jsMatch0.10.37
OR
nodejsnode.jsMatch0.10.38
OR
nodejsnode.jsMatch0.10.39
OR
nodejsnode.jsMatch0.10.40
OR
nodejsnode.jsMatch0.10.41
OR
nodejsnode.jsMatch0.12.0
OR
nodejsnode.jsMatch0.12.1
OR
nodejsnode.jsMatch0.12.2
OR
nodejsnode.jsMatch0.12.3
OR
nodejsnode.jsMatch0.12.4
OR
nodejsnode.jsMatch0.12.5
OR
nodejsnode.jsMatch0.12.6
OR
nodejsnode.jsMatch0.12.7
OR
nodejsnode.jsMatch0.12.8
OR
nodejsnode.jsMatch0.12.9
OR
nodejsnode.jsMatch4.0.0
OR
nodejsnode.jsMatch4.1.0
OR
nodejsnode.jsMatch4.1.1
OR
nodejsnode.jsMatch4.1.2
OR
nodejsnode.jsMatch4.2.0
OR
nodejsnode.jsMatch4.2.1
OR
nodejsnode.jsMatch4.2.2
OR
nodejsnode.jsMatch4.2.3
OR
nodejsnode.jsMatch4.2.4
OR
nodejsnode.jsMatch4.2.5
OR
nodejsnode.jsMatch4.2.6
OR
nodejsnode.jsMatch4.3.0
OR
nodejsnode.jsMatch4.3.1
OR
nodejsnode.jsMatch4.3.1rc.1
OR
nodejsnode.jsMatch4.3.1rc.2
OR
nodejsnode.jsMatch4.3.2
OR
nodejsnode.jsMatch4.4.0
OR
nodejsnode.jsMatch4.4.0rc.1
OR
nodejsnode.jsMatch4.4.0rc.2
OR
nodejsnode.jsMatch4.4.0rc.3
OR
nodejsnode.jsMatch4.4.0rc.4
OR
nodejsnode.jsMatch4.4.1
OR
nodejsnode.jsMatch5.0.0
OR
nodejsnode.jsMatch5.1.0
OR
nodejsnode.jsMatch5.1.1
OR
nodejsnode.jsMatch5.2.0
OR
nodejsnode.jsMatch5.3.0
OR
nodejsnode.jsMatch5.4.0
OR
nodejsnode.jsMatch5.4.1
OR
nodejsnode.jsMatch5.5.0
OR
nodejsnode.jsMatch5.6.0
OR
nodejsnode.jsMatch5.7.0
OR
nodejsnode.jsMatch5.7.1
OR
nodejsnode.jsMatch5.8.0
OR
nodejsnode.jsMatch5.8.1rc.1
OR
nodejsnode.jsMatch5.9.0
OR
nodejsnode.jsMatch5.9.1
Node
npmjsnpmRange<2.15.1
OR
npmjsnpmRange3.0.03.8.3

Social References

More

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.2 High

AI Score

Confidence

High

5 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.002 Low

EPSS

Percentile

61.9%