CVE-2022-31033Sensitive Information Exposure in Mechanize

Severity
7.5HIGHNVD
GHSA6.5OSV6.5
EPSS
0.3%
top 43.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 9

Description

The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

debiandebian/ruby-mechanize< ruby-mechanize 2.8.5-1 (bookworm)
CVEListV5sparklemotion/mechanize< 2.8.5
RubyGemsmechanize_project/mechanize< 2.8.5

Also affects: Fedora 35, 36

Patches

🔴Vulnerability Details

3
OSV
Mechanize before v2.8.5 vulnerable to authorization header leak on port redirect2022-06-09
OSV
CVE-2022-31033: The Mechanize library is used for automating interaction with websites2022-06-09
GHSA
Mechanize before v2.8.5 vulnerable to authorization header leak on port redirect2022-06-09

📋Vendor Advisories

1
Debian
CVE-2022-31033: ruby-mechanize - The Mechanize library is used for automating interaction with websites. Mechaniz...2022
CVE-2022-31033 — Sensitive Information Exposure | cvebase