[GHSA-r4q5-vmmm-2653] follow-redirects leaks Custom Authentication Headers to Cross-Domain Redirect Targets#7476
Conversation
|
Hi there @RubenVerborgh! A community member has suggested an improvement to your security advisory. If approved, this change will affect the global advisory listed at github.com/advisories. It will not affect the version listed in your project repository. This change will be reviewed by our Security Curation Team. If you have thoughts or feedback, please share them in a comment here! If this PR has already been closed, you can start a new community contribution for this advisory |
There was a problem hiding this comment.
Pull request overview
Updates the affected version range for the follow-redirects advisory (GHSA-r4q5-vmmm-2653) to reflect that the vulnerable cross-host header-forwarding behavior begins at 0.0.6, aligning applicability with observed runtime behavior.
Changes:
- Update the affected range “introduced” version from
0to0.0.6. - Bump the advisory
modifiedtimestamp accordingly.
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
Honestly, I don't know… v0.0.6 was over 10 years ago, and before I got involved. I just hope no one still runs 0.x. |
|
Hi @ljharb,
|
Updates
Comments
Empirical POC-based runtime testing confirms follow-redirects 0.0.1-0.0.5 do not leak custom sensitive headers on cross-host redirects - same mechanism as GHSA-74fj-2j2h-c42q. The sensitiveHeaders option the advisory describes is a late addition, but the underlying cross-host header-forwarding behavior the leak depends on is what determines applicability, and that behavior was introduced in 0.0.6.