GHSA-v78c-4p63-2j6c

Suggest an improvement
Source
https://github.com/advisories/GHSA-v78c-4p63-2j6c
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-v78c-4p63-2j6c/GHSA-v78c-4p63-2j6c.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v78c-4p63-2j6c
Published
2022-08-30T20:28:43Z
Modified
2022-08-30T20:28:43Z
Summary
Cleartext Transmission of Sensitive Information in moment-timezone
Details

Impact

  • if Alice uses grunt data (or grunt release) to prepare a custom-build, moment-timezone with the latest tzdata from IANA's website
  • and Mallory intercepts the request to IANA's unencrypted ftp server, Mallory can serve data which might exploit further stages of the moment-timezone tzdata pipeline, or potentially produce a tainted version of moment-timezone (practicality of such attacks is not proved)

Patches

Problem has been patched in version 0.5.35, patch should be applicable with minor modifications to all affected versions. The patch includes changing the FTP endpoint with an HTTPS endpoint.

Workarounds

Specify the exact version of tzdata (like 2014d, full command being grunt data:2014d, then run the rest of the release tasks by hand), or just apply the patch before issuing the grunt command.

References

Affected packages

npm / moment-timezone

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.1.0
Fixed
0.5.35