漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
highlight vulnerable to cleartext transmission of sensitive information
Vulnerability Description
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `type="password"` inputs. A customer may assume that switching to `type="text"` would also not record this input; hence, they would not add additional `highlight-mask` css-class obfuscation to this part of the DOM, resulting in unintentional recording of a password value when a `Show Password` button is used. This issue was patched in version 6.0.0. This patch tracks changes to the `type` attribute of an input to ensure an input that used to be a `type="password"` continues to be obfuscated.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N
Vulnerability Type
敏感数据的明文传输
Vulnerability Title
highlight.io 安全漏洞
Vulnerability Description
highlight.io是开源的全栈监控平台。错误监控、会话重播、日志记录等。 highlight.io 6.0.0之前版本存在安全漏洞,该漏洞源于在使用Show Password按钮时无意中记录密码值。
CVSS Information
N/A
Vulnerability Type
N/A