Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9w6v-m7wp-jwg4

Опубликовано: 29 апр. 2020
Источник: github
Github: Прошло ревью
CVSS3: 6.3

Описание

Http request which redirect to another hostname do not strip authorization header in @actions/http-client

Impact

If consumers of the http-client:

  1. make an http request with an authorization header
  2. that request leads to a redirect (302) and
  3. the redirect url redirects to another domain or hostname

The authorization header will get passed to the other domain.

Note that since this library is for actions, the GITHUB_TOKEN that is available in actions is generated and scoped per job with these permissions.

Patches

The problem is fixed in 1.0.8 at npm here. In 1.0.8, the authorization header is stripped before making the redirected request if the hostname is different.

Workarounds

None.

References

https://github.com/actions/http-client/pull/27

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

@actions/http-client

npm
Затронутые версииВерсия исправления

< 1.0.8

1.0.8

EPSS

Процентиль: 62%
0.00434
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 6.3
nvd
почти 6 лет назад

Actions Http-Client (NPM @actions/http-client) before version 1.0.8 can disclose Authorization headers to incorrect domain in certain redirect scenarios. The conditions in which this happens are if consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname Then the authorization header will get passed to the other domain. The problem is fixed in version 1.0.8.

EPSS

Процентиль: 62%
0.00434
Низкий

6.3 Medium

CVSS3

Дефекты

CWE-200