Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
highlight vulnerable to cleartext transmission of sensitive information
Vulnerability Description
Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `type="password"` inputs. A customer may assume that switching to `type="text"` would also not record this input; hence, they would not add additional `highlight-mask` css-class obfuscation to this part of the DOM, resulting in unintentional recording of a password value when a `Show Password` button is used. This issue was patched in version 6.0.0. This patch tracks changes to the `type` attribute of an input to ensure an input that used to be a `type="password"` continues to be obfuscated.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N
Vulnerability Type
敏感数据的明文传输
Vulnerability Title
highlight.io 安全漏洞
Vulnerability Description
highlight.io是开源的全栈监控平台。错误监控、会话重播、日志记录等。 highlight.io 6.0.0之前版本存在安全漏洞,该漏洞源于在使用Show Password按钮时无意中记录密码值。
CVSS Information
N/A
Vulnerability Type
N/A