Lucene search

K
cvelistGitHub_MCVELIST:CVE-2020-11021
HistoryApr 29, 2020 - 6:00 p.m.

CVE-2020-11021 HTTP request which redirect to another hostname do not strip authorization header in Actions Http-Client

2020-04-2918:00:20
CWE-200
GitHub_M
www.cve.org

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

52.2%

Actions Http-Client (NPM @actions/http-client) before version 1.0.8 can disclose Authorization headers to incorrect domain in certain redirect scenarios. The conditions in which this happens are if consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname Then the authorization header will get passed to the other domain. The problem is fixed in version 1.0.8.

CNA Affected

[
  {
    "product": "http-client",
    "vendor": "actions",
    "versions": [
      {
        "status": "affected",
        "version": "< 1.0.8"
      }
    ]
  }
]

6.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

0.002 Low

EPSS

Percentile

52.2%