Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-45289

Summary
Assigner-Go
Assigner Org ID-1bb62c36-49e3-4200-9d77-64a1400537cc
Published At-05 Mar, 2024 | 22:22
Updated At-13 Feb, 2025 | 17:14
Rejected At-
Credits

Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Go
Assigner Org ID:1bb62c36-49e3-4200-9d77-64a1400537cc
Published At:05 Mar, 2024 | 22:22
Updated At:13 Feb, 2025 | 17:14
Rejected At:
▼CVE Numbering Authority (CNA)
Incorrect forwarding of sensitive headers and cookies on HTTP redirect in net/http

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

Affected Products
Vendor
Go standard library
Product
net/http
Collection URL
https://pkg.go.dev
Package Name
net/http
Program Routines
  • isDomainOrSubdomain
  • Client.Do
  • Client.Get
  • Client.Head
  • Client.Post
  • Client.PostForm
  • Get
  • Head
  • Post
  • PostForm
Default Status
unaffected
Versions
Affected
  • From 0 before 1.21.8 (semver)
  • From 1.22.0-0 before 1.22.1 (semver)
Vendor
Go standard library
Product
net/http/cookiejar
Collection URL
https://pkg.go.dev
Package Name
net/http/cookiejar
Program Routines
  • isIP
  • Jar.Cookies
  • Jar.SetCookies
Default Status
unaffected
Versions
Affected
  • From 0 before 1.21.8 (semver)
  • From 1.22.0-0 before 1.22.1 (semver)
Problem Types
TypeCWE IDDescription
N/AN/ACWE-212: Improper Removal of Sensitive Information Before Storage or Transfer
Type: N/A
CWE ID: N/A
Description: CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Juho Nurminen of Mattermost
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://go.dev/issue/65065
N/A
https://go.dev/cl/569340
N/A
https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
N/A
https://pkg.go.dev/vuln/GO-2024-2600
N/A
https://security.netapp.com/advisory/ntap-20240329-0006/
N/A
http://www.openwall.com/lists/oss-security/2024/03/08/4
N/A
Hyperlink: https://go.dev/issue/65065
Resource: N/A
Hyperlink: https://go.dev/cl/569340
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
Resource: N/A
Hyperlink: https://pkg.go.dev/vuln/GO-2024-2600
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20240329-0006/
Resource: N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/08/4
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://go.dev/issue/65065
x_transferred
https://go.dev/cl/569340
x_transferred
https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
x_transferred
https://pkg.go.dev/vuln/GO-2024-2600
x_transferred
https://security.netapp.com/advisory/ntap-20240329-0006/
x_transferred
http://www.openwall.com/lists/oss-security/2024/03/08/4
x_transferred
Hyperlink: https://go.dev/issue/65065
Resource:
x_transferred
Hyperlink: https://go.dev/cl/569340
Resource:
x_transferred
Hyperlink: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
Resource:
x_transferred
Hyperlink: https://pkg.go.dev/vuln/GO-2024-2600
Resource:
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20240329-0006/
Resource:
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/08/4
Resource:
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:security@golang.org
Published At:05 Mar, 2024 | 23:15
Updated At:04 Nov, 2024 | 19:35

When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CPE Matches

Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2024/03/08/4security@golang.org
N/A
https://go.dev/cl/569340security@golang.org
N/A
https://go.dev/issue/65065security@golang.org
N/A
https://groups.google.com/g/golang-announce/c/5pwGVUPoMbgsecurity@golang.org
N/A
https://pkg.go.dev/vuln/GO-2024-2600security@golang.org
N/A
https://security.netapp.com/advisory/ntap-20240329-0006/security@golang.org
N/A
Hyperlink: http://www.openwall.com/lists/oss-security/2024/03/08/4
Source: security@golang.org
Resource: N/A
Hyperlink: https://go.dev/cl/569340
Source: security@golang.org
Resource: N/A
Hyperlink: https://go.dev/issue/65065
Source: security@golang.org
Resource: N/A
Hyperlink: https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
Source: security@golang.org
Resource: N/A
Hyperlink: https://pkg.go.dev/vuln/GO-2024-2600
Source: security@golang.org
Resource: N/A
Hyperlink: https://security.netapp.com/advisory/ntap-20240329-0006/
Source: security@golang.org
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found