Описание
A common setup to deploy to gh-pages on every commit via a CI system is to expose a github token to ENV and to use it directly in the auth part of the url. In module versions < 0.9.1 the auth portion of the url is outputted as part of the grunt tasks logging function. If this output is publicly available then the credentials should be considered compromised.
Ссылки
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 0.9.1 (исключая)
cpe:2.3:a:grunt-gh-pages_project:grunt-gh-pages:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 53%
0.003
Низкий
8.6 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-391
CWE-255
Связанные уязвимости
github
почти 7 лет назад
grunt-gh-pages before 0.10.0 may allow unencrypted GitHub credentials to be written to a log file
EPSS
Процентиль: 53%
0.003
Низкий
8.6 High
CVSS3
5 Medium
CVSS2
Дефекты
CWE-391
CWE-255