uniquelyparticular / stripe-distinct-usage-tracking

This Particular example demonstrates how you can track unique Usage Records for Metered Pricing Subscriptions in Stripe.
https://uniquelyparticular.com
MIT License
1 stars 1 forks source link

CVE-2020-26226 (High) detected in semantic-release-15.13.18.tgz #90

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2020-26226 - High Severity Vulnerability

Vulnerable Library - semantic-release-15.13.18.tgz

Automated semver compliant package publishing

Library home page: https://registry.npmjs.org/semantic-release/-/semantic-release-15.13.18.tgz

Path to dependency file: stripe-distinct-usage-tracking/package.json

Path to vulnerable library: stripe-distinct-usage-tracking/node_modules/semantic-release

Dependency Hierarchy: - :x: **semantic-release-15.13.18.tgz** (Vulnerable Library)

Found in HEAD commit: 99f7e0cccf77c73bc2d4d2b0d475b323516820c7

Vulnerability Details

In the npm package semantic-release before version 17.2.3, secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. Secrets that do not contain characters that become encoded when included in a URL are already masked properly. The issue is fixed in version 17.2.3.

Publish Date: 2020-11-18

URL: CVE-2020-26226

CVSS 3 Score Details (8.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639

Release Date: 2020-11-18

Fix Resolution: 17.2.3


Step up your Open Source Security Game with WhiteSource here