Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTl3NnYtbTd3cC1qd2c0

Http request which redirect to another hostname do not strip authorization header in @actions/http-client

Impact

If consumers of the http-client:

  1. make an http request with an authorization header
  2. that request leads to a redirect (302) and
  3. the redirect url redirects to another domain or hostname

The authorization header will get passed to the other domain.

Note that since this library is for actions, the GITHUB_TOKEN that is available in actions is generated and scoped per job with these permissions.

Patches

The problem is fixed in 1.0.8 at npm here. In 1.0.8, the authorization header is stripped before making the redirected request if the hostname is different.

Workarounds

None.

References

https://github.com/actions/http-client/pull/27

For more information

If you have any questions or comments about this advisory:

Permalink: https://github.com/advisories/GHSA-9w6v-m7wp-jwg4
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTl3NnYtbTd3cC1qd2c0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 4 years ago
Updated: almost 2 years ago


CVSS Score: 6.3
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Identifiers: GHSA-9w6v-m7wp-jwg4, CVE-2020-11021
References: Repository: https://github.com/actions/http-client
Blast Radius: 31.6

Affected Packages

npm:@actions/http-client
Dependent packages: 41
Dependent repositories: 104,097
Downloads: 13,487,865 last month
Affected Version Ranges: < 1.0.8
Fixed in: 1.0.8
All affected versions: 1.0.0, 1.0.1, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7
All unaffected versions: 1.0.8, 1.0.9, 1.0.10, 1.0.11, 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.2.3