Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 06 Jan 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2. | |
| Title | Deno's authorization headers not dropped when redirecting cross-origin | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-01-06T22:26:40.723Z
Updated: 2025-01-07T16:49:19.307Z
Reserved: 2024-12-29T03:00:24.714Z
Link: CVE-2025-21620
Updated: 2025-01-07T16:49:13.504Z
Status : Received
Published: 2025-01-06T23:15:07.770
Modified: 2025-01-06T23:15:07.770
Link: CVE-2025-21620
No data.