First published: Thu Jan 23 2025(Updated: )
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
Credit: security@golang.org
Affected Software | Affected Version | How to fix |
---|---|---|
Google Cloud HTTP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45336 is considered a high-severity vulnerability due to the potential exposure of sensitive headers.
CVE-2024-45336 affects the HTTP client by dropping sensitive headers such as Authorization when following cross-domain redirects.
CVE-2024-45336 impacts the Google net/http library.
The recommended mitigation for CVE-2024-45336 is to avoid relying on sensitive headers during cross-domain redirects.
CVE-2024-45336 was disclosed in October 2024.