First published: Wed Feb 09 2022(Updated: )
A flaw was found in the follow-redirects package. This flaw allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol. This issue happens with an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle (MITM) attack.
Credit: security@huntr.dev security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Follow-redirects Project Follow-redirects | <1.14.8 | |
npm/follow-redirects | <1.14.8 | 1.14.8 |
redhat/follow-redirects | <1.14.8 | 1.14.8 |
IBM Cognos Controller | <=11.0.0 - 11.0.1 |
https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-0536 is a vulnerability that allows the exposure of sensitive information to an unauthorized actor due to the usage of insecure HTTP protocol.
CVE-2022-0536 happens when there is an Authorization header leak from the same hostname, https-http, and requires a Man-in-the-Middle attack.
The follow-redirects package prior to version 1.14.8 is affected by CVE-2022-0536.
The severity of CVE-2022-0536 is medium with a CVSS score of 5.9.
To fix CVE-2022-0536, upgrade the follow-redirects package to version 1.14.8 or later.