Sensitive information exposure through logs in npm-registry-fetch
Moderate severity
GitHub Reviewed
Published
Jul 7, 2020
in
npm/npm-registry-fetch
•
Updated Jan 9, 2023
Package
Affected versions
< 4.0.5
>= 5.0.0, < 8.1.1
Patched versions
4.0.5
8.1.1
Description
Reviewed
Jul 7, 2020
Published to the GitHub Advisory Database
Jul 7, 2020
Last updated
Jan 9, 2023
Affected versions of
npm-registry-fetch
are vulnerable to an information exposure vulnerability through log files. The cli supports URLs like<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>
. The password value is not redacted and is printed to stdout and also to any generated log files.References