vulnerability

Red Hat: CVE-2020-15095: CVE-2020-15095 npm: sensitive information exposure through logs (Multiple Advisories)

Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
2020-07-07
Added
2020-10-20
Modified
2023-12-15

Description

Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "://[[:]@][:][:][/]". The password value is not redacted and is printed to stdout and also to any generated log files.

Solution(s)

redhat-upgrade-nodejsredhat-upgrade-nodejs-debuginforedhat-upgrade-nodejs-debugsourceredhat-upgrade-nodejs-develredhat-upgrade-nodejs-docsredhat-upgrade-nodejs-full-i18nredhat-upgrade-nodejs-nodemonredhat-upgrade-nodejs-packagingredhat-upgrade-npm
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.