The vulnerability lies in the org.hl7.fhir.utilities.http.SimpleHTTPClient class, specifically within the get method that handles HTTP GET requests and automatically follows redirects. The vulnerability description states that when following a 30x redirect, the client sends the same set of headers, including potentially sensitive authentication headers, to the new host specified in the Location header. Analysis of the commits between the vulnerable version (6.8.2) and the patched version (6.9.0) reveals the exact fix. Commit 6b615880dce6730d15b4343af3211654e9b202c4 introduces a check within the redirect handling logic of the get method. A new isNotSameHost method is added and used to determine if the redirect target has a different host than the original request. If the host is different, a flag setAuthenticationHeaders is set to false, which prevents the setAuthenticationHeader method from being called for the subsequent request to the new host. This directly addresses the reported vulnerability by ensuring authentication headers are not leaked to external hosts during redirects. A later commit (3871cc69c0516628c19adf824e5e7b0a0531511b) further refactors this by introducing an IHTTPAuthenticationProvider interface, which centralizes the logic for when to provide authentication headers, making the solution more robust. The primary vulnerable function is org.hl7.fhir.utilities.http.SimpleHTTPClient.get as it contains the flawed redirect logic.