-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| guzzlehttp/guzzle | composer | < 6.5.8 | 6.5.8 |
| guzzlehttp/guzzle | composer | >= 7.0.0, < 7.4.5 | 7.4.5 |
The vulnerability stemmed from incomplete origin validation when handling redirects. The commit shows the check for CURLOPT_HTTPAUTH removal was originally based solely on host comparison (request->getUri()->getHost() !== nextRequest->getUri()->getHost()). The shouldStripSensitiveHeaders method only checked host mismatch and HTTP->HTTPS downgrades, missing port changes. These functions failed to properly clear authentication options when redirecting to different ports or schemes, allowing credentials to leak. The fix replaced these checks with Psr7\UriComparator::isCrossOrigin which properly validates host, port, and scheme changes.
Ongoing coverage of React2Shell