First published: Mon Mar 07 2022(Updated: )
HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. Users are advised to upgrade. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Httpie Httpie | <3.1.0 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24737 is a vulnerability in the HTTPie command-line HTTP client before version 3.1.0.
The severity of CVE-2022-24737 is medium with a CVSS score of 6.5.
CVE-2022-24737 affects HTTPie versions before 3.1.0.
To fix CVE-2022-24737, you should update HTTPie to version 3.1.0 or newer.
You can find more information about CVE-2022-24737 on the GitHub release page and the GitHub security advisories page.