blob: cf46af798259112018ead620a87df79abdb5e414 [file] [log] [blame]
id: GO-2025-3751
modules:
- module: std
versions:
- fixed: 1.23.10
- introduced: 1.24.0-0
- fixed: 1.24.4
vulnerable_at: 1.24.3
packages:
- package: net/http
symbols:
- Client.makeHeadersCopier
derived_symbols:
- Client.Do
- Client.Get
- Client.Head
- Client.Post
- Client.PostForm
- Get
- Head
- Post
- PostForm
summary: Sensitive headers not cleared on cross-origin redirect in net/http
description: |-
Proxy-Authorization and Proxy-Authenticate headers persisted on cross-origin
redirects potentially leaking sensitive information.
credits:
- Takeshi Kaneko (GMO Cybersecurity by Ierae, Inc.)
references:
- fix: https://go.dev/cl/679257
- report: https://go.dev/issue/73816
- web: https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A
cve_metadata:
id: CVE-2025-4673
cwe: 'CWE-201: Insertion of Sensitive Information Into Sent Data'
source:
id: go-security-team
created: 2025-06-10T12:39:34.42046-04:00
review_status: REVIEWED