During the installation process, the go-ipfs-deps module before 0.4.4 insecurely downloads resources over HTTP. This allows for a MITM attack to compromise the integrity of the resources used by this module and could allow for further compromise.
The product does not encrypt sensitive or critical information before storage or transmission.
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Link | Tags |
---|---|
https://nodesecurity.io/advisories/156 | third party advisory |
https://github.com/diasdavid/go-ipfs-dep/pull/12 | third party advisory issue tracking |