CVE-2016-10526
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2016-10526. We'll provide specific mitigation strategies based on your environment and risk profile.
Description
A common setup to deploy to gh-pages on every commit via a CI system is to expose a github token to ENV and to use it directly in the auth part of the url. In module versions < 0.9.1 the auth portion of the url is outputted as part of the grunt tasks logging function. If this output is publicly available then the credentials should be considered compromised.
Available Exploits
Related News
Affected Products
Affected Versions:
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
grunt-gh-pages before 0.10.0 may allow unencrypted GitHub credentials to be written to a log file
GHSA-rrj3-qmh8-72pfAdvisory Details
Affected Packages
CVSS Scoring
CVSS Score
References
Advisory provided by GitHub Security Advisory Database. Published: February 18, 2019, Modified: August 3, 2022