Insufficiently Protected Credentials Affecting airtable package, versions <0.11.6


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.23% (62nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-JS-AIRTABLE-3150819
  • published 30 Nov 2022
  • disclosed 30 Nov 2022
  • credit Unknown

How to fix?

Upgrade airtable to version 0.11.6 or higher.

Overview

airtable is a javascript client for Airtable.

Affected versions of this package are vulnerable to Insufficiently Protected Credentials due to the usage of misconfigured build script in its source package, which bundles environment variables (AIRTABLE_API_KEY and AIRTABLE_ENDPOINT_URL) into the build target of a transpiled bundle.

NOTE: This vulnerability is relevant only if all of the following conditions are met:

  1. the user has cloned the Airtable.js source onto their machine.

  2. the user runs the npm prepare script

  3. the user has the AIRTABLE_API_KEY environment variable set.

Workaround

  1. Unset the AIRTABLE_API_KEY environment variable in your shell and/or remove it from your .bashrc, .zshrc, or other shell configuration files.

Recommendations

Regenerate any Airtable API keys you use via https://airtable.com/account, as they may be present in bundled code.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
7.3 high
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    High
  • Privileges Required (PR)
    High
  • User Interaction (UI)
    Required
  • Scope (S)
    Changed
  • Confidentiality (C)
    High
  • Integrity (I)
    High
  • Availability (A)
    None
Expand this section

NVD

6.4 medium