Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15095

Опубликовано: 07 июл. 2020
Источник: debian
EPSS Низкий

Описание

Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
npmfixed6.14.6+ds-1package
npmfixed5.8.0+ds6-4+deb10u2busterpackage

Примечания

  • https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp

  • https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc

EPSS

Процентиль: 13%
0.00044
Низкий

Связанные уязвимости

CVSS3: 4.4
ubuntu
почти 5 лет назад

Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files.

CVSS3: 4.4
redhat
почти 5 лет назад

Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files.

CVSS3: 4.4
nvd
почти 5 лет назад

Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files.

suse-cvrf
больше 4 лет назад

Security update for nodejs8

suse-cvrf
больше 4 лет назад

Security update for nodejs8

EPSS

Процентиль: 13%
0.00044
Низкий