airtable airtable 不充分的凭证保护机制

admin 2023-11-30 04:58:12 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
airtable airtable 不充分的凭证保护机制

CVE编号

CVE-2022-46155

利用情况

暂无

补丁情况

N/A

披露时间

2022-11-30
漏洞描述
Airtable.js is the JavaScript client for Airtable. Prior to version 0.11.6, Airtable.js had a misconfigured build script in its source package. When the build script is run, it would bundle environment variables into the build target of a transpiled bundle. Specifically, the AIRTABLE_API_KEY and AIRTABLE_ENDPOINT_URL environment variables are inserted during Browserify builds due to being referenced in Airtable.js code. This only affects copies of Airtable.js built from its source, not those installed via npm or yarn. Airtable API keys set in users’ environments via the AIRTABLE_API_KEY environment variable may be bundled into local copies of Airtable.js source code if all of the following conditions are met: 1) the user has cloned the Airtable.js source onto their machine, 2) the user runs the `npm prepare` script, and 3) the user' has the AIRTABLE_API_KEY environment variable set. If these conditions are met, a user’s local build of Airtable.js would be modified to include the value of the AIRTABLE_API_KEY environment variable, which could then be accidentally shipped in the bundled code. Users who do not meet all three of these conditions are not impacted by this issue. Users should upgrade to Airtable.js version 0.11.6 or higher; or, as a workaround unset the AIRTABLE_API_KEY environment variable in their shell and/or remove it from your .bashrc, .zshrc, or other shell configuration files. Users should also regenerate any Airtable API keys they use, as the keysy may be present in bundled code.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/Airtable/airtable.js/pull/330/commits/b468d8fe48d75e3d5fe4...
https://github.com/Airtable/airtable.js/releases/tag/v0.11.6
https://github.com/Airtable/airtable.js/security/advisories/GHSA-vqm5-9546-x25v
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 airtable airtable * Up to (excluding) 0.11.6
CVSS3评分 6.4
  • 攻击路径 网络
  • 攻击复杂度 高
  • 权限要求 高
  • 影响范围 未更改
  • 用户交互 需要
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-312 敏感数据的明文存储
CWE-522 不充分的凭证保护机制
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0