First published: Fri Jan 14 2022(Updated: )
A flaw was found in node-fetch. When following a redirect to a third-party domain, node-fetch was forwarding sensitive headers such as "Authorization," "WWW-Authenticate," and "Cookie" to potentially untrusted targets. This flaw leads to the exposure of sensitive information to an unauthorized actor.
Credit: security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-nodejs14-nodejs | <0:14.21.1-3.el7 | 0:14.21.1-3.el7 |
redhat/rh-nodejs14-nodejs-nodemon | <0:2.0.20-2.el7 | 0:2.0.20-2.el7 |
Node-fetch Project Node-fetch | <2.6.7 | |
Node-fetch Project Node-fetch | >=3.0.0<3.1.1 | |
Siemens Sinec Ins | <1.0 | |
Siemens Sinec Ins | =1.0 | |
Siemens Sinec Ins | =1.0-sp1 | |
Debian Debian Linux | =10.0 | |
npm/node-fetch | <2.6.7 | 2.6.7 |
npm/node-fetch | >=3.0.0<3.1.1 | 3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2022-0235 is high (8.8).
The affected software for CVE-2022-0235 is node-fetch.
The remedy for CVE-2022-0235 is to update node-fetch to version 2.6.7 or 3.1.1.
More information about CVE-2022-0235 can be found in the NVD vulnerability report, GitHub commit, and Huntr bounty links.
CVE-2022-0235 exposes sensitive headers such as "Authorization," "WWW-Authenticate," and "Cookie" to potentially untrusted targets.