logo

CVE-2022-31051 semantic-release

Package

Manager: npm
Name: semantic-release
Vulnerable Version: >=17.0.4 <19.0.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00717 pctl0.71572

Details

Exposure of Sensitive Information to an Unauthorized Actor in semantic-release ### Impact _What kind of vulnerability is it? Who is impacted?_ Secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by [encodeURI](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI). Occurrence is further limited to execution contexts where push access to the related repository is not available without modifying the repository url to inject credentials. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Fixed in 19.0.3 ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ Secrets that do not contain characters that are excluded from encoding with `encodeURI` when included in a URL are already masked properly. ### References _Are there any links users can visit to find out more?_ * https://github.com/semantic-release/semantic-release/releases/tag/v19.0.3 * https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeURI ### For more information If you have any questions or comments about this advisory: * Open a discussion in [semantic-release discussions](https://github.com/semantic-release/semantic-release/discussions)

Metadata

Created: 2022-06-09T23:51:25Z
Modified: 2022-06-20T22:00:29Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/06/GHSA-x2pg-mjhr-2m5x/GHSA-x2pg-mjhr-2m5x.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-x2pg-mjhr-2m5x
Finding: F017
Auto approve: 1