Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-31033

Опубликовано: 09 июн. 2022
Источник: debian

Описание

The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-mechanizefixed2.8.5-1package
ruby-mechanizeno-dsabullseyepackage
ruby-mechanizeno-dsabusterpackage

Примечания

  • https://github.com/sparklemotion/mechanize/security/advisories/GHSA-64qm-hrgp-pgr9

  • Prerequisite to clear credential headers when redirecting to cross site

  • https://github.com/sparklemotion/mechanize/commit/17e5381032c90caf240ac3d2e52b353f40c18d83 (v2.8.0)

  • Fixed by: https://github.com/sparklemotion/mechanize/commit/907c778001625cb9daa686d5019c939cb416e45b (v2.8.5)

Связанные уязвимости

CVSS3: 5.9
ubuntu
больше 3 лет назад

The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue.

CVSS3: 5.9
nvd
больше 3 лет назад

The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue.

CVSS3: 5.9
github
больше 3 лет назад

Mechanize before v2.8.5 vulnerable to authorization header leak on port redirect