Miggo Logo

CVE-2022-31051: Exposure of Sensitive Information to an Unauthorized Actor in semantic-release

4.4

CVSS Score
3.1

Basic Information

EPSS Score
0.62884%
Published
6/9/2022
Updated
1/27/2023
KEV Status
No
Technology
TechnologyJavaScript

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
semantic-releasenpm>= 17.0.4, < 19.0.319.0.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from logging a modified repository URL containing credentials. The commit 58a226f shows the fix replaced options.repositoryUrl with options.originalRepositoryURL in the log message. The original implementation used a URL that might have been altered to include credentials (which encodeURI doesn't fully sanitize), while the patched version uses the unmodified URL. This indicates the logging function using options.repositoryUrl was the exposure point for improperly masked secrets.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t _W**t kin* o* vuln*r**ility is it? W*o is imp**t**?_ S**r*ts t**t woul* norm*lly ** m*sk** *y s*m*nti*-r*l**s* **n ** ***i**nt*lly *is*los** i* t**y *ont*in ***r**t*rs t**t *r* *x*lu*** *rom uri *n*o*in* *y [*n*o**URI](*ttps://**v*lop*r.m

Reasoning

T** vuln*r**ility st*mm** *rom lo**in* * mo*i*i** r*pository URL *ont*inin* *r***nti*ls. T** *ommit ******* s*ows t** *ix r*pl**** `options.r*positoryUrl` wit* `options.ori*in*lR*positoryURL` in t** lo* m*ss***. T** ori*in*l impl*m*nt*tion us** * URL