Vulnerability Details : CVE-2016-3956
The CLI in npm before 2.15.1 and 3.x before 3.8.3, as used in Node.js 0.10 before 0.10.44, 0.12 before 0.12.13, 4 before 4.4.2, and 5 before 5.10.0, includes bearer tokens with arbitrary requests, which allows remote HTTP servers to obtain sensitive information by reading Authorization headers.
Products affected by CVE-2016-3956
- cpe:2.3:a:ibm:sdk:*:*:*:*:*:nodejs:*:*
- cpe:2.3:a:ibm:sdk:*:*:*:*:*:nodejs:*:*
- cpe:2.3:a:ibm:sdk:*:*:*:*:*:nodejs:*:*
- cpe:2.3:a:nodejs:node.js:4.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.9:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.8:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.38:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.37:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.30:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.23:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.22:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.16:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.15:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.7:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.36:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.35:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.29:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.28:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.21:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.20:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.14:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.13:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.39:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.32:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.31:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.25:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.24:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.17:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.16-isaacs-manual:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.10:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.41:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.40:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.34:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.33:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.27:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.26:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.19:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.18:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.12:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:0.10.11:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.3.1:rc.2:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.4.0:rc.4:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.4.0:rc.3:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.4.0:rc.2:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.4.0:rc.1:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.8.1:rc.1:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:5.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:nodejs:node.js:4.3.1:rc.1:*:*:*:*:*:*
- cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
- cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-3956
2.39%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-3956
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-3956
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-3956
-
https://nodejs.org/en/blog/vulnerability/npm-tokens-leak-march-2016/
npm security updates v2.15.1 and v3.8.3 | Node.jsVendor Advisory
-
https://github.com/npm/npm/commit/fea8cc92cee02c720b58f95f14d315507ccad401
config: only send token to registry hosts · npm/npm@fea8cc9 · GitHubPatch;Third Party Advisory
-
https://github.com/npm/npm/issues/8380
npm uses auth token from registry on http[s]:// dependencies, breaking BitBucket URLs · Issue #8380 · npm/npm · GitHubThird Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21980827
IBM Security Bulletin: Current Releases of IBM® SDK for Node.js™ are affected by CVE-2016-3956Vendor Advisory
-
https://github.com/npm/npm/commit/f67ecad59e99a03e5aad8e93cd1a086ae087cb29
config: only send token to registry hosts · npm/npm@f67ecad · GitHubPatch;Third Party Advisory
-
http://blog.npmjs.org/post/142036323955/fixing-a-bearer-token-vulnerability
The npm Blog — fixing a bearer token vulnerabilityVendor Advisory
Jump to