Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-45289
HistoryMar 05, 2024 - 12:00 a.m.

CVE-2023-45289

2024-03-0500:00:00
ubuntu.com
ubuntu.com
25
http redirect
client vulnerability
sensitive headers
domain match
authorization
cookie
golang
packages

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

10.4%

When following an HTTP redirect to a domain which is not a subdomain match
or exact match of the initial domain, an http.Client does not forward
sensitive headers such as “Authorization” or “Cookie”. For example, a
redirect from foo.com to www.foo.com will forward the Authorization header,
but a redirect to bar.com will not. A maliciously crafted HTTP redirect
could cause sensitive headers to be unexpectedly forwarded.

Notes

Author Note
mdeslaur Packages built using golang need to be rebuilt once the vulnerability has been fixed. This CVE entry does not list packages that need rebuilding outside of the main repository or the Ubuntu variants with PPA overlays. Warning: do not include nullboot in the list of no-change rebuilds after fixing an issue in golang.