CVE-2020-15095
low-risk
Published 2020-07-07
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files.
Do I need to act?
-
0.10% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.4/10
Medium
LOCAL
/ HIGH complexity
Affected Vendors
References (16)
Third Party Advisory
https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp
Third Party Advisory
https://security.gentoo.org/glsa/202101-07
Third Party Advisory
https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp
Third Party Advisory
https://security.gentoo.org/glsa/202101-07
21
/ 100
low-risk
Severity
11/34 · Low
Exploitability
0/34 · Minimal
Exposure
10/34 · Low