://[[:]@][:]…"/> ://[[:]@][:]…"/> ://[[:]@][:]…"/>
CVE-2020-15095 PUBLISHED

Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "<protocol>://[<user>[:<password>]@]<hostname>[:<port>][:][/]<path>". The password value is not redacted and is printed to stdout and also to any generated log files.

EPSS 0.10% · 27.8th percentile

Risk Scores

EPSS Score
0.10%
27.8th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSnpm0, 1.3.10~dfsg-1, 1.2.18~dfsg-3
Ubuntu:Pro:18.04:LTSnpm0, 3.5.2-0ubuntu4, 3.5.2-0ubuntu4.1.18.04.1~esm1
Ubuntu:Pro:16.04:LTSnpm3.5.2-0ubuntu4.1.16.04.1~esm1, 0, 1.4.21+ds-2
Ubuntu:20.04:LTSnpm6.14.4+ds-1ubuntu2, 5.8.0+ds6-4, 0

Timeline

  • Jul 7, 2020 CVE Published
  • Apr 14, 2021 EPSS Score
  • Jun 22, 2021 EPSS Score
  • Aug 23, 2021 EPSS Score
  • Oct 24, 2021 EPSS Score
  • Dec 25, 2021 EPSS Score
  • Feb 4, 2022 EPSS Score
  • Feb 25, 2022 EPSS Score
  • Apr 28, 2022 EPSS Score
  • Aug 31, 2022 EPSS Score
  • Nov 1, 2022 EPSS Score
  • Jan 2, 2023 EPSS Score