5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.7 Medium
AI Score
Confidence
High
0.009 Low
EPSS
Percentile
82.4%
Authorization headers are already cleared on cross-origin redirect in
https://github.com/nodejs/undici/blob/main/lib/handler/redirect.js#L189, based on https://github.com/nodejs/undici/issues/872.
However, cookie headers which are sensitive headers and are official headers found in the spec, remain uncleared. There also has been active discussion of implementing a cookie store https://github.com/nodejs/undici/pull/1441, which suggests that there are active users using cookie headers in undici.
As such this may lead to accidental leakage of cookie to a 3rd-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the 3rd party site.
This was patched in v5.8.0.
By default, this vulnerability is not exploitable.
Do not enable redirections, i.e. maxRedirections: 0
(the default).
https://hackerone.com/reports/1635514
https://curl.se/docs/CVE-2018-1000007.html
https://curl.se/docs/CVE-2022-27776.html
If you have any questions or comments about this advisory:
github.com/nodejs/undici
github.com/nodejs/undici/blob/main/lib/handler/redirect.js#L189
github.com/nodejs/undici/commit/0a5bee9465e627be36bac88edf7d9bbc9626126d
github.com/nodejs/undici/issues/872
github.com/nodejs/undici/pull/1441
github.com/nodejs/undici/releases/tag/v5.8.0
github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp
hackerone.com/reports/1635514
nvd.nist.gov/vuln/detail/CVE-2022-31151
security.netapp.com/advisory/ntap-20220909-0006
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
5.7 Medium
AI Score
Confidence
High
0.009 Low
EPSS
Percentile
82.4%