CVE-2022-1650: Exposure of Sensitive Information in eventsource
9.3
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.84394%
CWE
Published
5/13/2022
Updated
11/28/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
eventsource | npm | < 1.1.1 | 1.1.1 |
eventsource | npm | >= 2.0.0, < 2.0.2 | 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability occurs in the HTTP redirect handling within the EventSource implementation. Analysis of the patches shows:
- The EventSource constructor's connect method directly copied headers without origin validation in vulnerable versions
- Added 'hasNewOrigin' flag and removeUnsafeHeaders function in patches prove sensitive headers were previously forwarded
- The core vulnerability manifests in the header processing flow during redirects, which is encapsulated in the EventSource/connect call stack
- Runtime detection would see these functions in stack traces when handling redirects with sensitive headers