First published: Thu Oct 12 2023(Updated: )
### Impact Undici clears Authorization headers on cross-origin redirects, but does not clear `Cookie` headers. By design, `cookie` headers are [forbidden request headers](https://fetch.spec.whatwg.org/#forbidden-request-header), disallowing them to be set in `RequestInit.headers` in browser environments. Since Undici handles headers more liberally than the specification, there was a disconnect from the assumptions the spec made, and Undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site. ### Patches This was patched in [e041de359221ebeae04c469e8aff4145764e6d76](https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76), which is included in version 5.26.2.
Credit: security-advisories@github.com security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Nodejs Undici | <5.26.2 | |
npm/undici | <5.26.2 | 5.26.2 |
redhat/node-undici | <5.26.2 | 5.26.2 |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45143 is a vulnerability in the Undici HTTP/1.1 client for Node.js version 5.26.2 and earlier.
The impact of CVE-2023-45143 is that Undici clears Authorization headers on cross-origin redirects, but does not clear Cookie headers, which could potentially lead to security breaches.
To fix CVE-2023-45143, upgrade to Undici version 5.26.2 or later.
CVE-2023-45143 has a severity rating of 3.9 (low).
You can find more information about CVE-2023-45143 in the references provided on the GitHub page for Undici.