Описание
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
golang-1.24 | fixed | 1.24~rc2-1 | package | |
golang-1.23 | fixed | 1.23.5-1 | package | |
golang-1.22 | fixed | 1.22.11-1 | package | |
golang-1.19 | removed | package | ||
golang-1.19 | no-dsa | bookworm | package | |
golang-1.15 | removed | package | ||
golang-1.15 | postponed | bullseye | package |
Примечания
https://groups.google.com/g/golang-announce/c/sSaUhLA-2SI
https://go.dev/issue/70530
Fixed by: https://github.com/golang/go/commit/6b605505047416bbbf513bba1540220a8897f3f6 (go1.24rc2)
Fixed by: https://github.com/golang/go/commit/bb8230f80535945648e8b56739ad450cf433eba9 (go1.23.5)
Fixed by: https://github.com/golang/go/commit/b72d56f98d6620ebe07626dca4bb67ea8e185379 (go1.22.11)
EPSS
Связанные уязвимости
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
EPSS