CVE-2023-45289
Published: March 7, 2024Last modified: July 22, 2025
Description
When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as "Authorization" or "Cookie". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 4.3 |
| Attack Vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | LOW |
| Integrity impact | NONE |
| Availability impact | NONE |
| Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | go | Fixed (1.21.8-r0) |
| Stream | go | Fixed (1.22.1-r0) | |
| Hardened Containers | 23 LTS | go | Fixed (1.21.8-r0) |
| Stream | go | Fixed (1.22.1-r0) |
References
- http://www.openwall.com/lists/oss-security/2024/03/08/4
- https://go.dev/cl/569340
- https://go.dev/issue/65065
- https://groups.google.com/g/golang-announce/c/5pwGVUPoMbg
- https://pkg.go.dev/vuln/GO-2024-2600
- https://security.netapp.com/advisory/ntap-20240329-0006/