You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
In the npm package semantic-release before version 17.2.3, secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that become encoded when included in a URL. Secrets that do not contain characters that become encoded when included in a URL are already masked properly. The issue is fixed in version 17.2.3.
CVE-2020-26226 - High Severity Vulnerability
Vulnerable Library - semantic-release-15.13.15.tgz
Automated semver compliant package publishing
Library home page: https://registry.npmjs.org/semantic-release/-/semantic-release-15.13.15.tgz
Path to dependency file: import-moltin-to-algolia/package.json
Path to vulnerable library: import-moltin-to-algolia/node_modules/semantic-release/package.json
Dependency Hierarchy:
Found in HEAD commit: 8a51a936425673b518c13ecf140de6a78a111f72
Vulnerability Details
In the npm package semantic-release before version 17.2.3, secrets that would normally be masked by
semantic-release
can be accidentally disclosed if they contain characters that become encoded when included in a URL. Secrets that do not contain characters that become encoded when included in a URL are already masked properly. The issue is fixed in version 17.2.3.Publish Date: 2020-11-18
URL: CVE-2020-26226
CVSS 3 Score Details (8.1)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: GHSA-r2j6-p67h-q639
Release Date: 2020-11-18
Fix Resolution: 17.2.3
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: