This patch tracks changes to the `type` attribute of an input to ensure an input that used to be a `type="password"` continues to be obfuscated.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1518 | Highlight is an open source, full-stack monitoring platform. Highlight may record passwords on customer deployments when a password html input is switched to `type="text"` via a javascript "Show Password" button. This differs from the expected behavior which always obfuscates `type="password"` inputs. A customer may assume that switching to `type="text"` would also not record this input; hence, they would not add additional `highlight-mask` css-class obfuscation to this part of the DOM, resulting in unintentional recording of a password value when a `Show Password` button is used. This issue was patched in version 6.0.0. This patch tracks changes to the `type` attribute of an input to ensure an input that used to be a `type="password"` continues to be obfuscated. |
Github GHSA |
GHSA-9qpj-qq2r-5mcc | html inputs of type password recorded in plaintext when converted to text inputs |
Tue, 14 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-01-14T19:30:59.002Z
Reserved: 2023-05-17T22:25:50.697Z
Link: CVE-2023-33187
Updated: 2024-08-02T15:39:35.715Z
Status : Modified
Published: 2023-05-26T21:15:20.693
Modified: 2024-11-21T08:05:04.797
Link: CVE-2023-33187
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA