Vulnerability Description
console-io is a module that allows users to implement a web console in their application. A malicious user could bypass the authentication and execute any command that the user who is running the console-io application 2.2.13 and earlier is able to run. This means that if console-io was running from root, the attacker would have full access to the system. This vulnerability exists because the console-io application does not configure socket.io to require authentication, which allows a malicious user to connect via a websocket to send commands and receive the response.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Console-Io Project | Console-Io | <= 2.2.13 |
Related Weaknesses (CWE)
References
- https://nodesecurity.io/advisories/90Third Party Advisory
- https://nodesecurity.io/advisories/90Third Party Advisory
FAQ
What is CVE-2016-10532?
CVE-2016-10532 is a vulnerability with a CVSS score of 9.8 (CRITICAL). console-io is a module that allows users to implement a web console in their application. A malicious user could bypass the authentication and execute any command that the user who is running the cons...
How severe is CVE-2016-10532?
CVE-2016-10532 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-10532?
Check the references section above for vendor advisories and patch information. Affected products include: Console-Io Project Console-Io.