First published: Wed Feb 09 2022(Updated: )
A flaw was found in the follow-redirects package. This flaw allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol. This issue happens with an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle (MITM) attack.
Credit: security@huntr.dev security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Follow-redirects Project Follow-redirects | <1.14.8 | |
npm/follow-redirects | <1.14.8 | 1.14.8 |
redhat/follow-redirects | <1.14.8 | 1.14.8 |
IBM Cloud Pak for Business Automation | <=V23.0.1 - V23.0.1-IF002 | |
IBM Cloud Pak for Business Automation | <=V21.0.3 - V21.0.3-IF024 | |
IBM Cloud Pak for Business Automation | <=V22.0.2 - V22.0.2-IF006 and later fixesV22.0.1 - V22.0.1-IF006 and later fixesV21.0.2 - V21.0.2-IF012 and later fixesV21.0.1 - V21.0.1-IF007 and later fixesV20.0.1 - V20.0.3 and later fixesV19.0.1 - V19.0.3 and later fixesV18.0.0 - V18.0.2 and later fixes |
https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-0536 is a vulnerability that allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol.
CVE-2022-0536 happens when there is an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle attack.
The follow-redirects package prior to version 1.14.8 is affected by CVE-2022-0536.
The severity of CVE-2022-0536 is medium with a CVSS score of 5.9.
To fix CVE-2022-0536, upgrade the follow-redirects package to version 1.14.8 or later.