Bug 1856875 (CVE-2020-15095)
| Summary: | CVE-2020-15095 npm: sensitive information exposure through logs | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Michael Kaplan <mkaplan> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | avibelli, bgeorges, chazlett, dbeveniu, dkreling, hesilva, hhorak, jbalunas, jorton, jpallich, jwon, krathod, lthon, mrunge, mszynkie, nodejs-maint, nodejs-sig, pgallagh, rruss, sgallagh, tchollingsworth, tcullum, thrcka, zsvetlik |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | npm 6.14.6 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-10-19 20:21:24 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1856876, 1856877, 1857054, 1857055, 1857056, 1857057, 1887948, 1887949, 1888291, 1916691, 1917863, 2037502, 2091691, 2092766, 2092893 | ||
| Bug Blocks: | 1856878 | ||
|
Description
Michael Kaplan
2020-07-14 15:48:56 UTC
Created nodejs tracking bugs for this issue: Affects: epel-all [bug 1856876] Affects: fedora-all [bug 1856877] Flaw summary: NPM supports the ability to install packages from a hosted git provider[1] in the format: `<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>[#<commit-ish> | #semver:<semver>]` As shown, a user could provide a password here. If the user does provide a password, it will be stored in the npm debug logs on the machine (default location $HOME/.npm/_logs/), which poses a security risk of an unauthorized person or group able to view the password in the logs. The patch avoids saving the password to the logs. NOTE: Using the above command format with a password provided in the terminal will still likely save the password to the terminal log e.g. bash history and is discouraged. Omitting the password from the URL command will create a prompt instead, and the password will be excluded from the terminal logs. 1. https://docs.npmjs.com/cli/install Mitigation: Do not provide a password to npm via the cli to avoid it from being entered into the logs and stdout, or use ssh instead. This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4272 https://access.redhat.com/errata/RHSA-2020:4272 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-15095 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:4903 https://access.redhat.com/errata/RHSA-2020:4903 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:5086 https://access.redhat.com/errata/RHSA-2020:5086 This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2021:0521 https://access.redhat.com/errata/RHSA-2021:0521 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:0548 https://access.redhat.com/errata/RHSA-2021:0548 |