EIQ-2019-0037



ID

EIQ-2019-0037

CVE

-

Description

https-proxy-agent could enable main-in-the-middle attacks

Date

23 Oct 2019

Severity

2 - MEDIUM

CVSSv3 score

6.1

Status

images/s/-u524h5/8501/61630d2d4f75946459caa0b3dbdac9bd6d7a7de4/_/images/icons/emoticons/check.svg 2.7.0

Assessment

https-proxy-agent versions 2.2.2 and earlier can enable man-in-the-middle (MitM) attacks.

The module implements Node.js http.Agent connectivity functionality through the HTTP CONNECT method and a proxy server.
If the connect request targets a secure (HTTPS) endpoint, and if it returns a response with an HTTP status code other than 200/OK, https-proxy-agent does not upgrade to TLS.
This exposes the request data, because it is transmitted over an unencrypted connection.

An attacker with access to the proxy server, and with the ability to obtain a TCP data dump, could intercept the request data.
The data may contain basic authentication details, or other authentication credential information.
The attacker could retrieve this data, and use it to impersonate the requesting client.

Mitigation

Upgrade to http-proxy-agent versions 2.2.3, 3.0.0, or later.

Affected versions

2.6.0 and earlier.

Notes

For more information, see:

< Back to all security issues and mitigation actions


In release notes 2.6.0

In release notes 2.7.0