-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stemmed from phin's custom redirect implementation that reused the original request's headers when recursively calling itself after a redirect. The commit removed this logic (lines 57-67 in lib/phin.js) and replaced it with centra's followRedirects which uses the follow-redirects library. This library automatically strips sensitive headers like Authorization during redirects to foreign domains. The main phin function's recursive redirect handling without header sanitization was the vulnerable component.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| phin | npm | < 3.7.1 | 3.7.1 |
KEV Misses 88% of Exploited CVEs- Get the report