Cross-Domain Redirect Vulnerability in Go's HTTP Client
CVE-2024-45336

6.1MEDIUM

Key Information:

Status
Vendor
CVE Published:
28 January 2025

Badges

đź“° News Worthy

What is CVE-2024-45336?

A vulnerability in the Go HTTP client allows sensitive headers to be dropped when following cross-domain redirects. Specifically, when the HTTP client is redirected from one domain to another, it does not send sensitive headers, such as the Authorization header, to the second domain. However, if the client follows a sequence of redirects that remain within the same domain, these sensitive headers are incorrectly restored and sent to subsequent requests within that domain. This behavior can lead to unintended exposure of sensitive information.

Affected Version(s)

net/http 0 < 1.22.11

net/http 1.23.0-0 < 1.23.5

net/http 1.24.0-0 < 1.24.0-rc.2

News Articles

KrakenD CE v2.9 released with improved sequential proxy and security

Discover the latest KrakenD updates, including enhanced sequential proxies, YAML encoding, offline linter capabilities, Lua header management, and critical security fixes

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • đź“°

    First article discovered by KrakenD

  • Vulnerability Reserved

Credit

Kyle Seely
.