Skip to content

Sensitive information exposure through logs in npm-registry-fetch

Moderate severity GitHub Reviewed Published Jul 7, 2020 in npm/npm-registry-fetch • Updated Jan 9, 2023

Package

npm npm-registry-fetch (npm)

Affected versions

< 4.0.5
>= 5.0.0, < 8.1.1

Patched versions

4.0.5
8.1.1

Description

Affected versions of npm-registry-fetch are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like <protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>. The password value is not redacted and is printed to stdout and also to any generated log files.

References

@claudiahdz claudiahdz published to npm/npm-registry-fetch Jul 7, 2020
Reviewed Jul 7, 2020
Published to the GitHub Advisory Database Jul 7, 2020
Last updated Jan 9, 2023

Severity

Moderate
5.3
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-jmqm-f2gx-4fjv
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.