CVE-2022-31090 — Sensitive Information Exposure in Guzzle
Severity
7.7HIGHNVD
GHSA6.5OSV6.5
EPSS
3.0%
top 13.41%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 27
Description
Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, stopping curl from appending the `Authorization…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:NExploitability: 3.1 | Impact: 4.0
Affected Packages5 packages
Also affects: Debian Linux 11.0
Patches
🔴Vulnerability Details
4📋Vendor Advisories
1Debian▶
CVE-2022-31090: guzzle - Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are s...↗2022