Release Date: | 2020-07-07 |
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like <protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>. The password value is not redacted and is printed to stdout and also to any generated log files.
See more information about CVE-2020-15095 from MITRE CVE dictionary and NIST NVD
NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.
Base Score: | 4.4 | Base Metrics: | AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N |
Access Vector: | Local network | Attack Complexity: | High |
Privileges Required: | Low | User Interaction: | Required |
Scope: | Unchanged | Confidentiality Impact: | High |
Integrity Impact: | None | Availability Impact: | None |
Platform | Errata | Release Date |
Oracle Linux version 8 (nodejs) | ELSA-2020-4272 | 2020-10-20 |
Oracle Linux version 8 (nodejs) | ELSA-2021-0548 | 2021-02-20 |
Oracle Linux version 8 (nodejs-nodemon) | ELSA-2020-4272 | 2020-10-20 |
Oracle Linux version 8 (nodejs-nodemon) | ELSA-2021-0548 | 2021-02-20 |
Oracle Linux version 8 (nodejs-packaging) | ELSA-2020-4272 | 2020-10-20 |
Oracle Linux version 8 (nodejs-packaging) | ELSA-2021-0548 | 2021-02-20 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team