CVE-2022-31090Sensitive Information Exposure in Guzzle

Severity
7.7HIGHNVD
GHSA6.5OSV6.5
EPSS
3.0%
top 13.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 27

Description

Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, stopping curl from appending the `Authorization

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 3.1 | Impact: 4.0

Affected Packages5 packages

Packagistguzzlehttp/guzzle7.0.07.4.5+1
CVEListV5guzzle/guzzle< 6.5.8+1
NVDguzzlephp/guzzle7.0.07.4.5+1
Debianguzzle/guzzle< 7.4.5-1+2
Debianmediawiki/mediawiki< 1:1.35.8-1~deb11u1+3

Also affects: Debian Linux 11.0

Patches

🔴Vulnerability Details

4
CVEList
CURLOPT_HTTPAUTH option not cleared on change of origin in Guzzle2022-06-27
OSV
CVE-2022-31090: Guzzle, an extensible PHP HTTP client2022-06-27
GHSA
CURLOPT_HTTPAUTH option not cleared on change of origin2022-06-21
OSV
CURLOPT_HTTPAUTH option not cleared on change of origin2022-06-21

📋Vendor Advisories

1
Debian
CVE-2022-31090: guzzle - Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are s...2022