Cleartext storage of sensitive information in EasyBuild - CVE-2020-5262
Published: March 26, 2020 / Updated: April 1, 2020
EasyBuild
Detailed vulnerability description
The vulnerability allows a remote attacker to gain access to sensitive information on the target system.
The vulnerability exists due to the GitHub Personal Access Token (PAT) used by EasyBuild for the GitHub integration features (like `--new-pr`, `--fro,-pr`, etc.) is shown in plain text in EasyBuild debug log files. A remote authenticated attacker can obtain this token.