Lucene search

K
vulnrichmentGitHub_MVULNRICHMENT:CVE-2024-31206
HistoryApr 04, 2024 - 10:10 p.m.

CVE-2024-31206 Use of Unencrypted HTTP Request in dectalk-tts

2024-04-0422:10:29
CWE-598
CWE-300
CWE-319
GitHub_M
github.com
2
cve-2024-31206
dectalk-tts
unencrypted http
man-in-the-middle
api.

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

AI Score

6.3

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In [email protected], network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version 1.0.1. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:jstnmcbrd:dectalk-tts:1.0.0:*:*:*:*:*:*:*"
    ],
    "vendor": "jstnmcbrd",
    "product": "dectalk-tts",
    "versions": [
      {
        "status": "affected",
        "version": "1.0.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

8.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N

AI Score

6.3

Confidence

High

SSVC

Exploitation

none

Automatable

yes

Technical Impact

partial

Related for VULNRICHMENT:CVE-2024-31206