Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-x565-32qp-m3vf: phin may include sensitive headers in subsequent requests after redirect

Impact

Users may be impacted if sending requests including sensitive data in specific headers with followRedirects enabled.

Patches

The follow-redirects library is now being used for redirects and removes some headers that may contain sensitive information in some situations.

Workarounds

N/A. Please update to resolve the issue.

ghsa
#vulnerability#git

Skip to content

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
  • Pricing

Provide feedback

Saved searches****Use saved searches to filter your results more quickly

Sign up

  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-x565-32qp-m3vf

phin may include sensitive headers in subsequent requests after redirect

Moderate severity GitHub Reviewed Published Apr 11, 2024 in ethanent/phin • Updated Apr 11, 2024

Affected versions

< 3.7.1

Description

Impact

Users may be impacted if sending requests including sensitive data in specific headers with followRedirects enabled.

Patches

The follow-redirects library is now being used for redirects and removes some headers that may contain sensitive information in some situations.

Workarounds

N/A. Please update to resolve the issue.

References

  • GHSA-x565-32qp-m3vf
  • ethanent/phin@c071f95

Published to the GitHub Advisory Database

Apr 11, 2024

Last updated

Apr 11, 2024

ghsa: Latest News

GHSA-x7m9-mv49-fv73: Vaultwarden vulnerable to user impersonation