5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
0.002 Low
EPSS
Percentile
59.8%
HTTPie have the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. As an example, we can make an authenticated request and save it to a named session called api
:
$ http --session api -a user:pass pie.dev/basic-auth/user/pass
{
"authenticated": true,
"user": "user"
}
Since we have now saved the authentication data to that session, we wonβt have to enter it again and again on every invocation. We can simply reference the session, and HTTPie will use the saved state directly from it:
$ http --session api pie.dev/basic-auth/user/pass
{
"authenticated": true,
"user": "user"
}
One particular use case of these sessions is storing cookies (commonly referred to as a Cookie Jar
). If a response has a Set-Cookie
header, HTTPie will parse it and store the actual cookie in the session. And from that point on, all outgoing requests will attach that cookie (in the form of a Cookie
header).
This is extremely useful, especially when you are dealing with websites which manage their own state on the client-side through cookies.
$ http -F --session jar pie.dev/cookies/set/x/y
{
"cookies": {
"x": "y"
}
}
Before 3.1.0
, HTTPie didnβt distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website, e.g:
$ http -F --session jar pie.dev/redirect-to url==https://httpbin.org/cookies
(Pre 3.1.0)
{
"cookies": {
"x": "y"
}
}
(Post 3.1.0)
{
"cookies": {}
}
This behavior has been corrected in this release (with taking RFC 6265 β HTTP State Management Mechanism into the consideration).
A huge credit goes to @Glyph for disclosing the original vulnerability to us (through huntr.dev).
We suggest users to upgrade their HTTPie version to 3.1.0
or higher, and run httpie cli sessions upgrade
command on their sessions.
If you have any questions or comments about this advisory:
[email protected]
> Please note that this entry is covered by both CVE-2022-24737 and CVE-2022-0430.
github.com/advisories/GHSA-9w4w-cpc8-h2fq
github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b
github.com/httpie/httpie/releases/tag/3.1.0
github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq
lists.fedoraproject.org/archives/list/[email protected]/message/4QZD2AZOL7XLNZVAV6GDNXYU6MFRU5RS/
lists.fedoraproject.org/archives/list/[email protected]/message/R5VYSYKEKVZEVEBIWAADGDXG4Y3EWCQ3/
lists.fedoraproject.org/archives/list/[email protected]/message/TXFCHGTW3V32GD6GXXJZE5QAOSDT3RTY/
nvd.nist.gov/vuln/detail/CVE-2022-24737
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
0.002 Low
EPSS
Percentile
59.8%