Authorization headers are cleared on cross-origin redirect. However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There are active users using cookie headers in undici. This may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. This was patched in v5.7.1. By default, this vulnerability is not exploitable. Do not enable redirections, i.e. `maxRedirections: 0` (the default).
Metrics
Affected Vendors & Products
References
History
Sun, 08 Sep 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat acm |
|
CPEs | cpe:/a:redhat:acm:2.4::el8 | |
Vendors & Products |
Redhat
Redhat acm |
Mon, 19 Aug 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | ||
Vendors & Products |
Redhat
Redhat acm |
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2022-07-20T23:00:15
Updated: 2024-08-03T07:11:39.602Z
Reserved: 2022-05-18T00:00:00
Link: CVE-2022-31151
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-07-21T04:15:12.157
Modified: 2024-11-21T07:04:00.370
Link: CVE-2022-31151
Redhat