### [CVE-2016-10526](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10526) ![](https://img.shields.io/static/v1?label=Product&message=grunt-gh-pages%20node%20module&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Unchecked%20Error%20Condition%20(CWE-391)&color=brighgreen) ### Description A common setup to deploy to gh-pages on every commit via a CI system is to expose a github token to ENV and to use it directly in the auth part of the url. In module versions < 0.9.1 the auth portion of the url is outputted as part of the grunt tasks logging function. If this output is publicly available then the credentials should be considered compromised. ### POC #### Reference No PoCs from references. #### Github - https://github.com/ARPSyndicate/cvemon