CVE-2020-15095

Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files.
Configurations

Configuration 1 (hide)

cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

History

07 Nov 2023, 03:17

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/', 'name': 'FEDORA-2020-43d5a372fc', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ -

02 Aug 2022, 20:44

Type Values Removed Values Added
First Time Fedoraproject
Npmjs
Npmjs npm
Fedoraproject fedora
CPE cpe:2.3:a:cli_project:cli:*:*:*:*:*:node.js:*:* cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ - (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4OOYAMJVLLCLXDTHW3V5UXNULZBBK4O6/ - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html - Third Party Advisory (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00015.html - Mailing List, Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html - Third Party Advisory (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00011.html - Mailing List, Third Party Advisory
References (GENTOO) https://security.gentoo.org/glsa/202101-07 - (GENTOO) https://security.gentoo.org/glsa/202101-07 - Third Party Advisory
References (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html - Third Party Advisory (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00023.html - Mailing List, Third Party Advisory

11 Jan 2021, 11:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202101-07 -

Information

Published : 2020-07-07 19:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-15095

Mitre link : CVE-2020-15095

CVE.ORG link : CVE-2020-15095


JSON object : View

Products Affected

fedoraproject

  • fedora

npmjs

  • npm

opensuse

  • leap
CWE
CWE-532

Insertion of Sensitive Information into Log File