typed-rest-client 1.7.3 or lower: Auth Header Leakage on Redirect (fixed 1.8.0)
CVE-2023-30846 Published on April 26, 2023
typed-rest-client vulnerable to potential leak of authentication data to 3rd parties
typed-rest-client is a library for Node Rest and Http Clients with typings for use with TypeScript. Users of the typed-rest-client library version 1.7.3 or lower are vulnerable to leak authentication data to 3rd parties. The flow of the vulnerability is as follows: First, send any request with `BasicCredentialHandler`, `BearerCredentialHandler` or `PersonalAccessTokenCredentialHandler`. Second, the target host may return a redirection (3xx), with a link to a second host. Third, the next request will use the credentials to authenticate with the second host, by setting the `Authorization` header. The expected behavior is that the next request will *NOT* set the `Authorization` header. The problem was fixed in version 1.8.0. There are no known workarounds.
Vulnerability Analysis
CVE-2023-30846 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Insufficiently Protected Credentials
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Products Associated with CVE-2023-30846
Want to know whenever a new CVE is published for Microsoft Typed Rest Client? stack.watch will email you.
Affected Versions
microsoft typed-rest-client Version < 1.8.0 is affected by CVE-2023-30846Vulnerable Packages
The following package name and versions may be associated with CVE-2023-30846
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| npm | typed-rest-client | < 1.8.0 | 1.8.0 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.