CVE-2024-24758: Undici proxy-authorization header not cleared on cross-origin redirect in fetch
3.9
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.29535%
CWE
Published
2/16/2024
Updated
5/2/2024
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| undici | npm | <= 5.28.2 | 5.28.3 |
| undici | npm | >= 6.0.0, <= 6.6.0 | 6.6.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows the vulnerability was patched by adding 'request.headersList.delete("proxy-authorization", true)' in lib/fetch/index.js within the httpRedirectFetch function. This function is responsible for handling redirect logic and previously only cleared Authorization headers. The test file modification also verifies Proxy-Authorization header clearance was missing in redirect handling. The function's role in processing cross-origin redirects and its direct modification in the security patch confirm it as the vulnerable component.