CVE-2020-11021 – @actions/http-client
Package
Manager: npm
Name: @actions/http-client
Vulnerable Version: >=0 <1.0.8
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
EPSS: 0.00434 pctl0.61963
Details
Http request which redirect to another hostname do not strip authorization header in @actions/http-client ### Impact If consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname The authorization header will get passed to the other domain. Note that since this library is for actions, the GITHUB_TOKEN that is available in actions is generated and scoped per job with [these permissions](https://help.github.com/en/actions/configuring-and-managing-workflows/authenticating-with-the-github_token#permissions-for-the-github_token). ### Patches The problem is fixed in 1.0.8 at [npm here](https://www.npmjs.com/package/@actions/http-client). In 1.0.8, the authorization header is stripped before making the redirected request if the hostname is different. ### Workarounds None. ### References https://github.com/actions/http-client/pull/27 ### For more information If you have any questions or comments about this advisory: * Open an issue in https://github.com/actions/http-client/issues
Metadata
Created: 2020-04-29T17:58:53Z
Modified: 2021-08-25T21:03:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/04/GHSA-9w6v-m7wp-jwg4/GHSA-9w6v-m7wp-jwg4.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-9w6v-m7wp-jwg4
Finding: F310
Auto approve: 1