Yarn before 1.17.3 is vulnerable to Missing Encryption of Sensitive Data due to HTTP URLs in lockfile causing unencrypted authentication data to be sent over the network.
The product does not encrypt sensitive or critical information before storage or transmission.
The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors.
Link | Tags |
---|---|
https://hackerone.com/reports/640904 | third party advisory permissions required |
https://github.com/ChALkeR/notes/blob/master/Yarn-vuln.md | third party advisory exploit |
https://yarnpkg.com/blog/2019/07/12/recommended-security-update/ | vendor advisory |