Credentials saved as clear-text in log Affecting grunt-gh-pages package, versions <=0.9.1
Threat Intelligence
EPSS
0.15% (53rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID npm:grunt-gh-pages:20160316
- published 17 Mar 2016
- disclosed 16 Mar 2016
- credit Stephan Bönnemann
Introduced: 16 Mar 2016
CVE-2016-10526 Open this link in a new tabHow to fix?
Upgrade to version 1.0.0 or greater and consider revoking previously used credentials with the module.
Overview
grunt-gh-pages
writes the repository url to log without redacting the github authentication token. The token can be compromised if the logs become publicly available.
CVSS Scores
version 3.1