Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-31151

Опубликовано: 21 июл. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 3.7

Описание

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. maxRedirections: 0 (the default).

РелизСтатусПримечание
bionic

DNE

devel

needs-triage

esm-apps/noble

needs-triage

esm-infra/focal

DNE

focal

DNE

jammy

DNE

kinetic

ignored

end of life, was needs-triage
lunar

ignored

end of life, was needs-triage
mantic

ignored

end of life, was needs-triage
noble

needs-triage

Показывать по

EPSS

Процентиль: 32%
0.00127
Низкий

3.7 Low

CVSS3

Связанные уязвимости

CVSS3: 3.7
redhat
больше 3 лет назад

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).

CVSS3: 3.7
nvd
больше 3 лет назад

Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).

CVSS3: 3.7
debian
больше 3 лет назад

Authorization headers are cleared on cross-origin redirect. However, c ...

CVSS3: 3.7
github
больше 3 лет назад

undici before v5.8.0 vulnerable to uncleared cookies on cross-host / cross-origin redirect

EPSS

Процентиль: 32%
0.00127
Низкий

3.7 Low

CVSS3