Related Vulnerabilities: CVE-2021-21374  

In Nimble before version 0.13.0, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform man-in-the-middle (MitM) can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.

Severity High

Remote Yes

Type Man-in-the-middle

Description

In Nimble before version 0.13.0, "nimble refresh" fetches a list of Nimble packages over HTTPS without full verification of the SSL/TLS certificate due to the default setting of httpClient. An attacker able to perform man-in-the-middle (MitM) can deliver a modified package list containing malicious software packages. If the packages are installed and used the attack escalates to untrusted code execution.

AVG-1842 nimble 1:0.12.0-1 High Vulnerable

https://github.com/nim-lang/security/security/advisories/GHSA-c2wm-v66h-xhxx
https://consensys.net/diligence/vulnerabilities/nim-insecure-ssl-tls-defaults-remote-code-execution/
https://github.com/nim-lang/nimble/commit/b60b6f8d5832c7393676ba7bcd0e07d293cec738