Nimble is a package manager for the Nim programming language. In Nim release versions before versions 1.2.10 and 1.4.4, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform MitM can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.
The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.
The product does not validate, or incorrectly validates, a certificate.
Link | Tags |
---|---|
https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/ | third party advisory exploit |
https://github.com/nim-lang/nimble/blob/master/changelog.markdown#0130 | third party advisory release notes |
https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx | third party advisory |
https://github.com/nim-lang/Nim/pull/16940 | third party advisory patch |