You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
typed-rest-client is a library for Node Rest and Http Clients with typings for use with TypeScript. Users of the typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. The flow of the vulnerability is as follows: First, send any request with BasicCredentialHandler, BearerCredentialHandler or PersonalAccessTokenCredentialHandler. Second, the target host may return a redirection (3xx), with a link to a second host. Third, the next request will use the credentials to authenticate with the second host, by setting the Authorization header. The expected behavior is that the next request will NOT set the Authorization header. The problem was fixed in version 1.8.0. There are no known workarounds.
CVE-2023-30846 - High Severity Vulnerability
Node Rest and Http Clients for use with TypeScript
Library home page: https://registry.npmjs.org/typed-rest-client/-/typed-rest-client-1.1.2.tgz
Path to dependency file: /event-system/package.json
Path to vulnerable library: /node_modules/typed-rest-client/package.json
Dependency Hierarchy:
Found in HEAD commit: 6ecfa86344702cb200f5d39ba3d704da1ea21e88
typed-rest-client is a library for Node Rest and Http Clients with typings for use with TypeScript. Users of the typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. The flow of the vulnerability is as follows: First, send any request with
BasicCredentialHandler
,BearerCredentialHandler
orPersonalAccessTokenCredentialHandler
. Second, the target host may return a redirection (3xx), with a link to a second host. Third, the next request will use the credentials to authenticate with the second host, by setting theAuthorization
header. The expected behavior is that the next request will NOT set theAuthorization
header. The problem was fixed in version 1.8.0. There are no known workarounds.Publish Date: 2023-04-26
URL: CVE-2023-30846
Base Score Metrics:
Type: Upgrade version
Origin: https://www.cve.org/CVERecord?id=CVE-2023-30846
Release Date: 2023-04-26
Fix Resolution (typed-rest-client): 1.8.0
Direct dependency fix Resolution (stryker): 1.0.0
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: