Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-31151

Опубликовано: 21 июл. 2022
Источник: debian
EPSS Низкий

Описание

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-undicifixed5.8.0+dfsg1+~cs18.9.16-1package

Примечания

  • https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp

  • https://github.com/nodejs/undici/issues/872

  • https://hackerone.com/reports/1635514

EPSS

Процентиль: 32%
0.00127
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
больше 3 лет назад

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).

CVSS3: 3.7
redhat
больше 3 лет назад

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).

CVSS3: 3.7
nvd
больше 3 лет назад

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).

CVSS3: 3.7
github
больше 3 лет назад

undici before v5.8.0 vulnerable to uncleared cookies on cross-host / cross-origin redirect

EPSS

Процентиль: 32%
0.00127
Низкий