Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-28849

Опубликовано: 14 мар. 2024
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

follow-redirects is an open source, drop-in replacement for Node's http and https modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

A vulnerability was found in the follow-redirects package. While processing the cross-domain redirection, follow-redirects clears authorization headers, however, it misses clearing proxy-authentication headers, which contain credentials as well. This issue may lead to credential leaking, having a high impact on data confidentiality.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 2follow-redirectsFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Will not fix
Migration Toolkit for Applications 6follow-redirectsAffected
Migration Toolkit for Virtualizationmigration-toolkit-virtualization/mtv-console-plugin-rhel9Affected
Node HealthCheck Operatorworkload-availability/node-remediation-console-rhel8Will not fix
OpenShift Pipelinesopenshift-pipelines/pipelines-hub-ui-rhel8Affected
OpenShift Serverlessfollow-redirectsWill not fix
OpenShift Service Mesh 2openshift-service-mesh/kiali-rhel8Affected
Red Hat 3scale API Management Platform 23scale-amp-system-containerWill not fix
Red Hat Advanced Cluster Security 3advanced-cluster-security/rhacs-main-rhel8Will not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2269576follow-redirects: Possible credential leak

EPSS

Процентиль: 71%
0.00677
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
почти 2 года назад

follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 6.5
nvd
почти 2 года назад

follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 6.5
msrc
почти 2 года назад

Proxy-Authorization header kept across hosts in follow-redirects

CVSS3: 6.5
debian
почти 2 года назад

follow-redirects is an open source, drop-in replacement for Node's `ht ...

CVSS3: 6.5
github
почти 2 года назад

follow-redirects' Proxy-Authorization header kept across hosts

EPSS

Процентиль: 71%
0.00677
Низкий

6.5 Medium

CVSS3