7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
31.4%
guzzlehttp/guzzle is vulnerable to information disclosure. The vulnerability exists because the modifyRequest
function of RedirectMiddleware.php
does not properly strip the authorization header or cookie header on a change in host or HTTP downgrade, allowing an attacker to get sensitive information through the Authorization
header by redirecting to the malicious urls
github.com/guzzle/guzzle/commit/724562fa861e21a4071c652c8a159934e4f05592
github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8
github.com/guzzle/guzzle/pull/3022
github.com/guzzle/guzzle/pull/3023
github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q
www.debian.org/security/2022/dsa-5246
www.drupal.org/sa-core-2022-011
www.rfc-editor.org/rfc/rfc9110.html#name-redirection-3xx
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
31.4%