ollow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches. https://github.com/follow-redirects/follow-redirects/issues/235 https://github.com/follow-redirects/follow-redirects/pull/236 https://security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137
Created cachelib tracking bugs for this issue: Affects: fedora-all [bug 2256416] Created fbthrift tracking bugs for this issue: Affects: fedora-all [bug 2256417] Created golang-github-prometheus tracking bugs for this issue: Affects: epel-all [bug 2256415] Created pgadmin4 tracking bugs for this issue: Affects: fedora-all [bug 2256418] Created rstudio tracking bugs for this issue: Affects: fedora-all [bug 2256419]
follow-redirects is a transitive dependency of Grafana, and its not affected by this CVE.
This issue has been addressed in the following products: RHOL-5.8-RHEL-9 Via RHSA-2024:0271 https://access.redhat.com/errata/RHSA-2024:0271
This issue has been addressed in the following products: MTR 1.2.4 Via RHSA-2024:0720 https://access.redhat.com/errata/RHSA-2024:0720
This issue has been addressed in the following products: NETWORK-OBSERVABILITY-1.5.0-RHEL-9 Via RHSA-2024:0853 https://access.redhat.com/errata/RHSA-2024:0853
This issue has been addressed in the following products: Red Hat Openshift distributed tracing 3.1 Via RHSA-2024:0998 https://access.redhat.com/errata/RHSA-2024:0998
This issue has been addressed in the following products: Red Hat OpenShift Container Platform 4.15 Via RHSA-2023:7198 https://access.redhat.com/errata/RHSA-2023:7198
This issue has been addressed in the following products: MTA-6.2-RHEL-9 MTA-6.2-RHEL-8 Via RHSA-2024:1027 https://access.redhat.com/errata/RHSA-2024:1027
This issue has been addressed in the following products: RHEL-9-CNV-4.15 Via RHSA-2024:3314 https://access.redhat.com/errata/RHSA-2024:3314
This issue has been addressed in the following products: MTA-7.0-RHEL-9 MTA-7.0-RHEL-8 Via RHSA-2024:3316 https://access.redhat.com/errata/RHSA-2024:3316
This issue has been addressed in the following products: MTA-6.2-RHEL-9 MTA-6.2-RHEL-8 Via RHSA-2024:3989 https://access.redhat.com/errata/RHSA-2024:3989
This issue has been solved in MCE 2.4.5 via this public advisory https://access.redhat.com/errata/RHBA-2024:3555