uniquelyparticular / sync-shipengine-to-moltin

This Particular example demonstrates how you can sync shipping delivered status from ShipEngine into Moltin via Webhook API.
https://uniquelyparticular.com
MIT License
1 stars 0 forks source link

CVE-2020-26226 (High) detected in semantic-release-15.13.14.tgz #105

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2020-26226 - High Severity Vulnerability

Vulnerable Library - semantic-release-15.13.14.tgz

Automated semver compliant package publishing

Library home page: https://registry.npmjs.org/semantic-release/-/semantic-release-15.13.14.tgz

Path to dependency file: sync-shipengine-to-moltin/package.json

Path to vulnerable library: sync-shipengine-to-moltin/node_modules/semantic-release/package.json

Dependency Hierarchy: - :x: **semantic-release-15.13.14.tgz** (Vulnerable Library)

Found in HEAD commit: 260af1ae7f7beec213197f37c7ad49163ae1ab84

Vulnerability Details

In the npm package semantic-release before version 17.2.3, secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. Secrets that do not contain characters that become encoded when included in a URL are already masked properly. The issue is fixed in version 17.2.3.

Publish Date: 2020-11-18

URL: CVE-2020-26226

CVSS 3 Score Details (8.1)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639

Release Date: 2020-11-18

Fix Resolution: 17.2.3


Step up your Open Source Security Game with WhiteSource here