Bug 2373305 (CVE-2025-4673)
| Summary: | CVE-2025-4673 net/http: Sensitive headers not cleared on cross-origin redirect in net/http | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
| Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
| Status: | NEW --- | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | aazores, abrianik, akostadi, alcohan, amasferr, amctagga, anjoseph, ansmith, anthomas, aoconnor, bbrownin, bdettelb, bniver, cbartlet, cmah, crizzo, davidn, dhanak, dmayorov, doconnor, drosa, dsimansk, dymurray, eaguilar, ebaron, eglynn, ehelms, fdeutsch, flucifre, ggainey, ggrzybek, gmeno, gparvin, gryan, gzaronik, haoli, hkataria, ibolton, jaharrin, jajackso, jburrell, jcammara, jcantril, jeder, jjoyce, jkoehler, jlledo, jmatthew, jmitchel, jmontleo, jneedle, jolong, jprabhak, jschluet, juwatts, jwendell, kegrant, kingland, koliveir, kshier, kverlaen, lchilton, lhh, lphiri, lsvaty, mabashia, manissin, matzew, mbenjamin, mbocek, mburns, mgarciac, mhackett, mhulan, mmakovy, mnovotny, mrunge, njean, nmoumoul, oramraz, osousa, owatkins, pahickey, parichar, pbraun, pcreech, peholase, periklis, pgaikwad, pgrist, pjindal, rcernich, rchan, rhaigner, rjohnson, rojacob, sakbas, sausingh, sdawley, sfeifer, shvarugh, simaishi, slucidi, smallamp, smcdonal, smullick, sostapov, sseago, stcannon, stirabos, tasato, teagle, tfister, thason, thavo, tjochec, vereddy, vimartin, whayutin, wtam, yguenane |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | --- | |
| Doc Text: |
A flaw was found in net/http. Handling Proxy-Authorization and Proxy-Authenticate headers during cross-origin redirects allows these headers to be inadvertently forwarded, potentially exposing sensitive authentication credentials. This flaw allows a network-based attacker to manipulate redirect responses, unintentionally exposing authentication details to unauthorized parties.
|
Story Points: | --- |
| Clone Of: | Environment: | ||
| Last Closed: | Type: | --- | |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2374280, 2374705, 2374278 | ||
| Bug Blocks: | |||
|
Description
OSIDB Bzimport
2025-06-18 06:35:20 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:10672 https://access.redhat.com/errata/RHSA-2025:10672 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:10676 https://access.redhat.com/errata/RHSA-2025:10676 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:10677 https://access.redhat.com/errata/RHSA-2025:10677 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:15406 https://access.redhat.com/errata/RHSA-2025:15406 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:15887 https://access.redhat.com/errata/RHSA-2025:15887 This issue has been addressed in the following products: Red Hat Enterprise Linux 10 Via RHSA-2025:16432 https://access.redhat.com/errata/RHSA-2025:16432 |