Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-45143

Опубликовано: 12 окт. 2023
Источник: redhat
CVSS3: 3.9
EPSS Низкий

Описание

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear Cookie headers. By design, cookie headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

A flaw was found in the Undici node package due to the occurrence of Cross-origin requests, possibly leading to a cookie header leakage. By default, cookie headers are forbidden request headers, and they must be enabled. This flaw allows a malicious user to access this leaked cookie if they have control of the redirection.

Отчет

Since this requires a non-standard configuration, as well as control of the redirection, Red Hat rates this as having a Low impact.

Меры по смягчению последствий

No current mitigation is available.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Serverlessnode-undiciAffected
Red Hat Developer Hubrhdh-operator-containerAffected
Red Hat Developer Hubrhdh/rhdh-hub-rhel9Affected
Red Hat Enterprise Linux 8nodejs:16/nodejsFix deferred
Red Hat Enterprise Linux 9nodejsFix deferred
Red Hat Enterprise Linux 9nodejs:20/nodejsAffected
Red Hat OpenShift Dev Spacesdevspaces/dashboard-rhel8Affected
Red Hat Software Collectionsrh-nodejs14-nodejsFix deferred
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:586918.10.2023
Red Hat Enterprise Linux 8nodejsFixedRHSA-2023:720514.11.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-200

EPSS

Процентиль: 24%
0.00078
Низкий

3.9 Low

CVSS3

Связанные уязвимости

CVSS3: 3.9
ubuntu
больше 1 года назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.9
nvd
больше 1 года назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.

CVSS3: 3.5
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 3.9
debian
больше 1 года назад

Undici is an HTTP/1.1 client written from scratch for Node.js. Prior t ...

CVSS3: 3.9
github
больше 1 года назад

Undici's cookie header not cleared on cross-origin redirect in fetch

EPSS

Процентиль: 24%
0.00078
Низкий

3.9 Low

CVSS3

Уязвимость CVE-2023-45143