Описание
Exposure of Sensitive Information in eventsource
When fetching an url with a link to an external site (Redirect), the users Cookies & Autorisation headers are leaked to the third party application. According to the same-origin-policy, the header should be "sanitized."
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-1650
- https://github.com/EventSource/eventsource/pull/273#issuecomment-1127624508
- https://github.com/EventSource/eventsource/commit/f9f6416567bff62c1af2f4314be51d9870e94bc2
- https://github.com/eventsource/eventsource/commit/10ee0c4881a6ba2fe65ec18ed195ac35889583c4
- https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e
- https://lists.debian.org/debian-lts-announce/2022/12/msg00021.html
Пакеты
eventsource
< 1.1.1
1.1.1
eventsource
>= 2.0.0, < 2.0.2
2.0.2
Связанные уязвимости
Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository eventsource/eventsource prior to v2.0.2.
Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository eventsource/eventsource prior to v2.0.2.
Improper Removal of Sensitive Information Before Storage or Transfer in GitHub repository eventsource/eventsource prior to v2.0.2.
Improper Removal of Sensitive Information Before Storage or Transfer i ...
Уязвимость библиотеки eventsource/eventsource, связанная с недостаточной защитой служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации