Bug 2256413 (CVE-2023-26159)

Summary: CVE-2023-26159 follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()
Product: [Other] Security Response Reporter: Rohit Keshri <rkeshri>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aarif, aazores, abarbaro, abrianik, adamevin, adupliak, aileenc, akostadi, alcohan, amasferr, amctagga, anjoseph, anthomas, aprice, asoldano, bbaranow, bbuckingham, bcourt, bdettelb, bmaxwell, brian.stansberry, brking, btarraso, caswilli, cbartlet, cdaley, cdewolf, chazlett, cmah, cmiranda, crizzo, darran.lofthouse, dfreiber, dhanak, dkenigsb, dkreling, dkuc, dmayorov, doconnor, dosoudil, dranck, drow, dsimansk, dymurray, eaguilar, ebaron, ecerquei, ehelms, epacific, eric.wittmann, fdeutsch, fjansen, fjuma, ggainey, ggrzybek, gmalinko, gparvin, gsuckevi, haoli, hkataria, ibek, ibolton, istudens, ivassile, iweiss, jajackso, janstey, jburrell, jcammara, jcantril, jchui, jdobes, jhardy, jhe, jkang, jkoehler, jlledo, jmartisk, jmatthew, jmitchel, jmontleo, jneedle, jobarker, jolong, jpallich, jprabhak, jrokos, jsamir, jshaughn, jsherril, jtanner, juwatts, jvasik, jwendell, kaycoth, kegrant, kholdawa, kingland, koliveir, kshier, ktsao, kverlaen, lbainbri, lchilton, lcouzens, lgao, lphiri, lzap, mabashia, manissin, matzew, mhulan, mkudlej, mmakovy, mnovotny, mosmerov, mpierce, mskarbek, msochure, mstefank, msvehla, mwringe, nboldt, nipatil, njean, nmoumoul, nwallace, oezr, orabin, oramraz, osousa, owatkins, pahickey, pantinor, parichar, pbraun, pcongius, pcreech, pdelbell, pesilva, pgaikwad, pierdipi, pjindal, pmackay, porcelli, psegedy, psrna, rblanco, rcernich, rchan, rguimara, rhaigner, rhuss, rjohnson, rkubis, rojacob, rstancel, rstepani, rtaniwa, saroy, sausingh, sbiarozk, sdawley, sfeifer, sfroberg, shbose, shvarugh, sidakwo, simaishi, sipoyare, slucidi, smaestri, smallamp, smcdonal, smullick, sseago, stcannon, sthirugn, stirabos, tasato, teagle, tfister, thason, thavo, tjochec, tkral, tom.jenkinson, twalsh, vkrizan, vkumar, vmugicag, wtam, yguenane, zsadeh
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2256415, 2256416, 2256417, 2256418, 2256419, 2256420, 2256421, 2256422, 2257405, 2271406    
Bug Blocks: 2256412    

Description Rohit Keshri 2024-01-02 07:00:33 UTC
ollow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.

https://github.com/follow-redirects/follow-redirects/issues/235
https://github.com/follow-redirects/follow-redirects/pull/236
https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137

Comment 1 Rohit Keshri 2024-01-02 07:28:57 UTC
Created cachelib tracking bugs for this issue:

Affects: fedora-all [bug 2256416]


Created fbthrift tracking bugs for this issue:

Affects: fedora-all [bug 2256417]


Created golang-github-prometheus tracking bugs for this issue:

Affects: epel-all [bug 2256415]


Created pgadmin4 tracking bugs for this issue:

Affects: fedora-all [bug 2256418]


Created rstudio tracking bugs for this issue:

Affects: fedora-all [bug 2256419]

Comment 3 Sandipan Roy 2024-01-03 09:53:59 UTC
follow-redirects is a transitive dependency of Grafana, and its not affected by this CVE.

Comment 7 errata-xmlrpc 2024-01-17 11:32:00 UTC
This issue has been addressed in the following products:

  RHOL-5.8-RHEL-9

Via RHSA-2024:0271 https://access.redhat.com/errata/RHSA-2024:0271

Comment 11 errata-xmlrpc 2024-02-07 15:00:23 UTC
This issue has been addressed in the following products:

  MTR 1.2.4

Via RHSA-2024:0720 https://access.redhat.com/errata/RHSA-2024:0720

Comment 12 errata-xmlrpc 2024-02-21 13:32:30 UTC
This issue has been addressed in the following products:

  NETWORK-OBSERVABILITY-1.5.0-RHEL-9

Via RHSA-2024:0853 https://access.redhat.com/errata/RHSA-2024:0853

Comment 13 errata-xmlrpc 2024-02-27 02:25:04 UTC
This issue has been addressed in the following products:

  Red Hat Openshift distributed tracing 3.1

Via RHSA-2024:0998 https://access.redhat.com/errata/RHSA-2024:0998

Comment 14 errata-xmlrpc 2024-02-27 20:49:57 UTC
This issue has been addressed in the following products:

  Red Hat OpenShift Container Platform 4.15

Via RHSA-2023:7198 https://access.redhat.com/errata/RHSA-2023:7198

Comment 15 errata-xmlrpc 2024-02-28 18:14:45 UTC
This issue has been addressed in the following products:

  MTA-6.2-RHEL-9
  MTA-6.2-RHEL-8

Via RHSA-2024:1027 https://access.redhat.com/errata/RHSA-2024:1027

Comment 24 errata-xmlrpc 2024-05-23 06:29:43 UTC
This issue has been addressed in the following products:

  RHEL-9-CNV-4.15

Via RHSA-2024:3314 https://access.redhat.com/errata/RHSA-2024:3314

Comment 25 errata-xmlrpc 2024-05-23 06:39:59 UTC
This issue has been addressed in the following products:

  MTA-7.0-RHEL-9
  MTA-7.0-RHEL-8

Via RHSA-2024:3316 https://access.redhat.com/errata/RHSA-2024:3316

Comment 28 errata-xmlrpc 2024-06-20 00:35:53 UTC
This issue has been addressed in the following products:

  MTA-6.2-RHEL-9
  MTA-6.2-RHEL-8

Via RHSA-2024:3989 https://access.redhat.com/errata/RHSA-2024:3989

Comment 30 Borja Tarraso 2024-11-08 16:05:44 UTC
This issue has been solved in MCE 2.4.5 via this public advisory https://access.redhat.com/errata/RHBA-2024:3555