7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
25.0%
guzzlehttp/guzzle is vulnerable to information disclosure. The vulnerability exists because the checkRedirect
function of RedirectMiddleware.php
does not properly clear the CURLOPT_HTTPAUTH
option on a change of origin, allowing an attacker to get sensitive information through the Authorization
header by redirecting to the malicious urls.
github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82
github.com/guzzle/guzzle/commit/a52f0440530b54fa079ce76e8c5d196a42cad981
github.com/guzzle/guzzle/pull/3042
github.com/guzzle/guzzle/pull/3043
github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r
security.gentoo.org/glsa/202305-24
www.debian.org/security/2022/dsa-5246
7.7 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
25.0%