CVE-2022-0355

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to access sensitive information, such as authentication tokens or passwords, that the simple-get library fails to properly remove before storing or sending it. It affects versions prior to 4.0.1, meaning users must update to this version or later to protect against potential data leaks.

Technical Description

Improper Removal of Sensitive Information Before Storage or Transfer in NPM simple-get prior to 4.0.1.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactNone
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade FPatched in 1490 days

Quick Information

Published

Jan 26, 2022

about 4 years ago

Last Modified

Feb 24, 2026

about 1 month ago

Vendor

simple-get project

Product

simple-get