CVE-2024-31206
CVSS V2 None
CVSS V3 None
Description
dectalk-tts is a Node package to interact with the aeiou Dectalk web API. In `dectalk-tts@1.0.0`, network requests to the third-party API are sent over HTTP, which is unencrypted. Unencrypted traffic can be easily intercepted and modified by attackers. Anyone who uses the package could be the victim of a man-in-the-middle (MITM) attack. The network request was upgraded to HTTPS in version `1.0.1`. There are no workarounds, but some precautions include not sending any sensitive information and carefully verifying the API response before saving it.
Overview
- CVE ID
- CVE-2024-31206
- Assigner
- GitHub_M
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-04-04T22:10:29.200Z
- Last Modified Date
- 2024-04-04T22:10:29.200Z
References
Reference URL | Reference Tags |
---|---|
https://github.com/JstnMcBrd/dectalk-tts/security/advisories/GHSA-6cf6-8hvr-r68w | x_refsource_CONFIRM |
https://github.com/JstnMcBrd/dectalk-tts/issues/3 | x_refsource_MISC |
https://github.com/JstnMcBrd/dectalk-tts/pull/4 | x_refsource_MISC |
https://github.com/JstnMcBrd/dectalk-tts/commit/3600d8ac156f27da553ac4ead46d16989a350105 | x_refsource_MISC |
https://github.com/JstnMcBrd/dectalk-tts/blob/b3e92156cbb699218ac9b9c7d8979abd0e635767/src/index.ts#L18 | x_refsource_MISC |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-31206 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31206 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-24 00:12:24 | Added to TrackCVE |