Описание
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
A flaw was found in follow-redirects when fetching a remote URL with a cookie when it gets to the Location response header. This flaw allows an attacker to hijack the account as the cookie is leaked.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
OpenShift Service Mesh 1 | npm-follow-redirects | Out of support scope | ||
OpenShift Service Mesh 2.0 | npm-follow-redirects | Will not fix | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/console-header-rhel8 | Will not fix | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | rhacm2/mcm-topology-rhel8 | Will not fix | ||
Red Hat Advanced Cluster Security 3 | follow-redirects | Affected | ||
Red Hat Advanced Cluster Management for Kubernetes 2 | acmesolver-container | Fixed | RHSA-2022:0856 | 14.03.2022 |
Red Hat Advanced Cluster Management for Kubernetes 2 | acm-must-gather-container | Fixed | RHSA-2022:0856 | 14.03.2022 |
Red Hat Advanced Cluster Management for Kubernetes 2 | acm-operator-bundle-container | Fixed | RHSA-2022:0856 | 14.03.2022 |
Red Hat Advanced Cluster Management for Kubernetes 2 | application-ui-container | Fixed | RHSA-2022:0856 | 14.03.2022 |
Red Hat Advanced Cluster Management for Kubernetes 2 | cainjector-container | Fixed | RHSA-2022:0856 | 14.03.2022 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.5 Medium
CVSS3
Связанные уязвимости
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor
follow-redirects is vulnerable to Exposure of Private Personal Informa ...
Exposure of sensitive information in follow-redirects
Уязвимость модуля Node.js follow-redirects, связанная с ошибками обработки файлов cookie, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
EPSS
6.5 Medium
CVSS3