The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue.
References
Link | Resource |
---|---|
https://github.com/sparklemotion/mechanize/security/advisories/GHSA-64qm-hrgp-pgr9 | Third Party Advisory |
https://github.com/sparklemotion/mechanize/commit/c7fe6996a5b95f9880653ba3bc548a8d4ef72317 | Patch Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7OKZMR5O3T5HQ2V737TC7IU4WZRT2LGX/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OA2FJROTX2U6EBWDPKRQ2VAM67A5TQXF/ | Mailing List Third Party Advisory |
Information
Published : 2022-06-09 13:15
Updated : 2022-11-29 08:55
NVD link : CVE-2022-31033
Mitre link : CVE-2022-31033
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
fedoraproject
- fedora
mechanize_project
- mechanize