Miggo Logo

CVE-2020-7654: Information Exposure in Snyk Broker

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.51112%
Published
6/3/2020
Updated
2/1/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
snyk-brokernpm< 4.73.14.73.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The patch adds 'origin' to the logger's sanitization serializers, indicating that prior to this fix:

  1. Logging methods (info/debug/etc) would output raw 'origin' field values
  2. These logging calls would appear in runtime profilers when DEBUG logging is enabled
  3. The vulnerable functions are the bunyan logger's methods themselves when handling objects containing 'origin' fields, as shown by the test case pattern in log.test.js

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*ll v*rsions o* snyk-*rok*r ***or* *.**.* *r* vuln*r**l* to In*orm*tion *xposur*. It lo*s priv*t* k*ys i* lo**in* l*v*l is s*t to ***U*.

Reasoning

T** p*t** ***s 'ori*in' to t** lo***r's s*nitiz*tion s*ri*liz*rs, in*i**tin* t**t prior to t*is *ix: *. Lo**in* m*t*o*s (in*o/***u*/*t*) woul* output r*w 'ori*in' *i*l* v*lu*s *. T**s* lo**in* **lls woul* *pp**r in runtim* pro*il*rs w**n ***U* lo**in