Количество 2
Количество 2
CVE-2025-21620
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2.
GHSA-f27p-cmv8-xhm6
fetch: Authorization headers not dropped when redirecting cross-origin
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-21620 Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2. | CVSS3: 7.5 | 0% Низкий | около 1 года назад | |
GHSA-f27p-cmv8-xhm6 fetch: Authorization headers not dropped when redirecting cross-origin | CVSS3: 7.5 | 0% Низкий | около 1 года назад |
Уязвимостей на страницу