支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2022-46155 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

漏洞
Airtable.js credentials exposed in browser builds
来源: 美国国家漏洞数据库 NVD
漏洞信息
Airtable.js is the JavaScript client for Airtable. Prior to version 0.11.6, Airtable.js had a misconfigured build script in its source package. When the build script is run, it would bundle environment variables into the build target of a transpiled bundle. Specifically, the AIRTABLE_API_KEY and AIRTABLE_ENDPOINT_URL environment variables are inserted during Browserify builds due to being referenced in Airtable.js code. This only affects copies of Airtable.js built from its source, not those installed via npm or yarn. Airtable API keys set in users’ environments via the AIRTABLE_API_KEY environment variable may be bundled into local copies of Airtable.js source code if all of the following conditions are met: 1) the user has cloned the Airtable.js source onto their machine, 2) the user runs the `npm prepare` script, and 3) the user' has the AIRTABLE_API_KEY environment variable set. If these conditions are met, a user’s local build of Airtable.js would be modified to include the value of the AIRTABLE_API_KEY environment variable, which could then be accidentally shipped in the bundled code. Users who do not meet all three of these conditions are not impacted by this issue. Users should upgrade to Airtable.js version 0.11.6 or higher; or, as a workaround unset the AIRTABLE_API_KEY environment variable in their shell and/or remove it from your .bashrc, .zshrc, or other shell configuration files. Users should also regenerate any Airtable API keys they use, as the keysy may be present in bundled code.
来源: 美国国家漏洞数据库 NVD
漏洞信息
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
漏洞
不充分的凭证保护机制
来源: 美国国家漏洞数据库 NVD
漏洞
Airtable.js 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
漏洞信息
Airtable.js是Airtable开源的一个 Airtable javascript 客户端。提供了一种访问数据的简单方法。 Airtable.js 0.11.6之前版本存在安全漏洞,该漏洞源于脚本中存在错误配置,当脚本运行时,它会将环境变量绑定到编译包的构建目标中。
来源: 中国国家信息安全漏洞库 CNNVD
漏洞信息
N/A
来源: 中国国家信息安全漏洞库 CNNVD
漏洞
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
Airtableairtable.js < 0.11.6 -
二、漏洞 CVE-2022-46155 的公开POC
#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2022-46155 的情报信息
登录 三、漏洞 %(cve_id)s 的情报信息
新漏洞
四、漏洞 CVE-2022-46155 的评论

暂无评论


发表评论