follow-redirects 1.14.1

4 security vulnerabilities found in version 1.14.1

Exposure of sensitive information in follow-redirects

high severity CVE-2022-0155
high severity CVE-2022-0155
Affected versions: < 1.14.7

follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor

follow-redirects' Proxy-Authorization header kept across hosts

medium severity CVE-2024-28849
medium severity CVE-2024-28849
Affected versions: <= 1.15.5

When using axios, its dependency follow-redirects only clears authorization header during cross-domain redirect, but allows the proxy-authentication header which contains credentials too.

Steps To Reproduce & PoC

Test code:

const axios = require('axios');

axios.get('http://127.0.0.1:10081/', {
 headers: {
 'AuThorization': 'Rear Test',
 'ProXy-AuthoriZation': 'Rear Test',
 'coOkie': 't=1'
 }
})
 .then((response) => {
 console.log(response);
 })

When I meet the cross-domain redirect, the sensitive headers like authorization and cookie are cleared, but proxy-authentication header is kept.

Impact

This vulnerability may lead to credentials leak.

Recommendations

Remove proxy-authentication header during cross-domain redirect

Recommended Patch

follow-redirects/index.js:464

- removeMatchingHeaders(/^(?:authorization|cookie)$/i, this._options.headers);
+ removeMatchingHeaders(/^(?:authorization|proxy-authorization|cookie)$/i, this._options.headers);

Follow Redirects improperly handles URLs in the url.parse() function

medium severity CVE-2023-26159
medium severity CVE-2023-26159
Affected versions: < 1.15.4

Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects

medium severity CVE-2022-0536
medium severity CVE-2022-0536
Affected versions: < 1.14.8

Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.

Author did not declare license for this package in the source code.


This package version has a MIT license in the source code, however it was not declared in the source code.

This package version is available.


This package version has not been yanked and is still available for usage.