Credentials saved as clear-text in log Affecting grunt-gh-pages package, versions <=0.9.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team

    Threat Intelligence

    EPSS
    0.15% (53rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID npm:grunt-gh-pages:20160316
  • published 17 Mar 2016
  • disclosed 16 Mar 2016
  • credit Stephan Bönnemann

How to fix?

Upgrade to version 1.0.0 or greater and consider revoking previously used credentials with the module.

Overview

grunt-gh-pages writes the repository url to log without redacting the github authentication token. The token can be compromised if the logs become publicly available.

CVSS Scores

version 3.1
Expand this section

Snyk

Recommended
6.5 medium
  • Attack Vector (AV)
    Network
  • Attack Complexity (AC)
    Low
  • Privileges Required (PR)
    None
  • User Interaction (UI)
    None
  • Scope (S)
    Unchanged
  • Confidentiality (C)
    Low
  • Integrity (I)
    Low
  • Availability (A)
    None