Skip to content

[GHSA-74fj-2j2h-c42q] Exposure of sensitive information in follow-redirects#7472

Closed
ljharb wants to merge 1 commit intoljharb/advisory-improvement-7472from
ljharb-GHSA-74fj-2j2h-c42q
Closed

[GHSA-74fj-2j2h-c42q] Exposure of sensitive information in follow-redirects#7472
ljharb wants to merge 1 commit intoljharb/advisory-improvement-7472from
ljharb-GHSA-74fj-2j2h-c42q

Conversation

@ljharb
Copy link
Copy Markdown

@ljharb ljharb commented Apr 21, 2026

Updates

  • Affected products

Comments
Empirical POC-based runtime testing confirms follow-redirects 0.0.1-0.0.5 do not leak Cookie headers on cross-host redirects. Versions 0.0.1-0.0.3 rebuild the redirect via a bare module.exports[__proto__].get(redirectUrl) call that forwards only the URL, so the original requests Cookie header never reaches the second hop. Versions 0.0.4-0.0.5 start forwarding some header state but still do not trigger the cross-host leak path. Cross-host header forwarding (and thus the vulnerability) landed in 0.0.6.

Copilot AI review requested due to automatic review settings April 21, 2026 17:27
@github-actions github-actions Bot changed the base branch from main to ljharb/advisory-improvement-7472 April 21, 2026 17:28
Copy link
Copy Markdown
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the GHSA advisory metadata for follow-redirects to reflect that the cross-host cookie/header leak behavior (and thus the vulnerability) begins at a later version than previously recorded.

Changes:

  • Update the advisory modified timestamp.
  • Narrow the affected version range by changing the introduced version from 0 to 0.0.6.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants