Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 06 Jan 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2. | |
Title | Deno's authorization headers not dropped when redirecting cross-origin | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-06T22:26:40.723Z
Updated: 2025-01-07T16:49:19.307Z
Reserved: 2024-12-29T03:00:24.714Z
Link: CVE-2025-21620
Vulnrichment
Updated: 2025-01-07T16:49:13.504Z
NVD
Status : Received
Published: 2025-01-06T23:15:07.770
Modified: 2025-01-06T23:15:07.770
Link: CVE-2025-21620
Redhat
No data.