Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1qNTYyLWMzY3ctM3A1Z84AArtS

Potential Authorization Header Exposure in NPM Packages @finastra/nestjs-proxy, @ffdc/nestjs-proxy

The nestjs-proxy library did not have a way to control when Authorization headers should should be forwarded for specific backend services configured by the application developer. This could have resulted in sensitive information such as OAuth bearer access tokens being inadvertently exposed to such services that should not see them.

A new feature has been introduced in the patched version of nestjs-proxy that allows application developers to opt out of forwarding the Authorization headers on a per service basis using the forwardToken config setting. Developers are advised to review the README for this library on Github or NPM for further details on how this configuration can be applied.

Patches

References

Permalink: https://github.com/advisories/GHSA-j562-c3cw-3p5g
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1qNTYyLWMzY3ctM3A1Z84AArtS
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: almost 2 years ago
Updated: over 1 year ago


CVSS Score: 5.8
CVSS vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N

Identifiers: GHSA-j562-c3cw-3p5g, CVE-2022-31069
References: Repository: https://github.com/Finastra/finastra-nodejs-libs
Blast Radius: 5.2

Affected Packages

npm:@finastra/nestjs-proxy
Dependent packages: 2
Dependent repositories: 8
Downloads: 1,915 last month
Affected Version Ranges: < 0.7.0
Fixed in: 0.7.0
All affected versions: 0.4.0, 0.5.0, 0.5.1, 0.5.2, 0.5.3, 0.6.0
All unaffected versions: 0.7.0, 0.7.1