Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-1200 | typed-rest-client is a library for Node Rest and Http Clients with typings for use with TypeScript. Users of the typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. The flow of the vulnerability is as follows: First, send any request with `BasicCredentialHandler`, `BearerCredentialHandler` or `PersonalAccessTokenCredentialHandler`. Second, the target host may return a redirection (3xx), with a link to a second host. Third, the next request will use the credentials to authenticate with the second host, by setting the `Authorization` header. The expected behavior is that the next request will *NOT* set the `Authorization` header. The problem was fixed in version 1.8.0. There are no known workarounds. |
Github GHSA |
GHSA-558p-m34m-vpmq | Potential leak of authentication data to 3rd parties |
Fri, 31 Jan 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T16:49:37.266Z
Reserved: 2023-04-18T16:13:15.880Z
Link: CVE-2023-30846
Updated: 2024-08-02T14:37:15.464Z
Status : Modified
Published: 2023-04-26T21:15:09.380
Modified: 2024-11-21T08:00:57.680
Link: CVE-2023-30846
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA