Логотип exploitDog
bind:CVE-2024-28849
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-28849

Количество 7

Количество 7

ubuntu логотип

CVE-2024-28849

почти 2 года назад

follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 6.5
EPSS: Низкий
redhat логотип

CVE-2024-28849

почти 2 года назад

follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2024-28849

почти 2 года назад

follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 6.5
EPSS: Низкий
msrc логотип

CVE-2024-28849

почти 2 года назад

Proxy-Authorization header kept across hosts in follow-redirects

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2024-28849

почти 2 года назад

follow-redirects is an open source, drop-in replacement for Node's `ht ...

CVSS3: 6.5
EPSS: Низкий
github логотип

GHSA-cxjh-pqwp-8mfp

почти 2 года назад

follow-redirects' Proxy-Authorization header kept across hosts

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2024-02610

почти 2 года назад

Уязвимость модуля Node.js follow-redirects, связанная с недостаточной защитой служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2024-28849

follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 6.5
1%
Низкий
почти 2 года назад
redhat логотип
CVE-2024-28849

follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 6.5
1%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-28849

follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.

CVSS3: 6.5
1%
Низкий
почти 2 года назад
msrc логотип
CVE-2024-28849

Proxy-Authorization header kept across hosts in follow-redirects

CVSS3: 6.5
1%
Низкий
почти 2 года назад
debian логотип
CVE-2024-28849

follow-redirects is an open source, drop-in replacement for Node's `ht ...

CVSS3: 6.5
1%
Низкий
почти 2 года назад
github логотип
GHSA-cxjh-pqwp-8mfp

follow-redirects' Proxy-Authorization header kept across hosts

CVSS3: 6.5
1%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02610

Уязвимость модуля Node.js follow-redirects, связанная с недостаточной защитой служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 6.5
1%
Низкий
почти 2 года назад

Уязвимостей на страницу