First published: Mon Jun 20 2022(Updated: )
Change in port should be considered a change in origin
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/guzzlehttp/guzzle | >=7<7.4.5>=4<6.5.8 | |
debian/guzzle | 7.4.5-1 | |
debian/mediawiki | 1:1.31.16-1+deb10u2 1:1.31.16-1+deb10u6 1:1.35.11-1~deb11u1 1:1.35.13-1~deb11u1 1:1.39.4-1~deb12u1 1:1.39.5-1~deb12u1 1:1.39.5-1 | |
guzzlephp Guzzle | <6.5.8 | |
guzzlephp Guzzle | >=7.0.0<7.4.5 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31091 is a vulnerability in Guzzle, an extensible PHP HTTP client, that allows sensitive information leakage when making requests with redirect to a URI with a different port.
The severity of CVE-2022-31091 is high with a CVSS score of 7.7.
CVE-2022-31091 affects Guzzle versions 4.x up to and including 6.5.8, and Guzzle versions 7.x up to and including 7.4.5.
The remedy for CVE-2022-31091 on Debian Linux is to update the package 'mediawiki' to versions 1:1.31.16-1+deb10u2, 1:1.31.16-1+deb10u6, 1:1.35.11-1~deb11u1, 1:1.35.13-1~deb11u1, 1:1.39.4-1~deb12u1, or 1:1.39.5-1~deb12u1.
To fix CVE-2022-31091 in Guzzle, update the package to version 7.4.5-1.