4/28/2023 0 Comments Drupal 7 exploit![]() If you do not require or expect redirects to be followed, one should simply disable redirects all together. Users unable to upgrade may consider an alternative approach to use your own redirect middleware, rather than ours. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4. Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. The Drupal project uses the pear ArchiveTar library, which has released a security update that impacts. It is, therefore, affected by a vulnerability. We now always strip it, and allow the cookie middleware to re-add any cookies that it deems should be there. According to its self-reported version, the instance of Drupal running on the remote web server is 7.x prior to 7.82, 8.9.x prior to 8.9.17, 9.1.x prior to 9.1.11, or 9.2.x prior to 9.2.2. Prior to this fix, only cookies that were managed by our cookie middleware would be safely removed, and any `Cookie` header manually added to the initial request would not be stripped. ![]() On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the `Cookie` header on. ![]() In affected versions the `Cookie` headers on requests are sensitive information. Guzzle is an open source PHP HTTP client. Alternately users may simply disable redirects all together if redirects are not expected or required. Users unable to upgrade may consider an alternative approach which would be to use their own redirect middleware. Prior to this fix, `https` to `http` downgrades did not result in the `Authorization` header being removed, only changes to the host. This is much the same as to how we don't forward on the header if the host changes. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, we should not forward the `Authorization` header on. In affected versions `Authorization` headers on requests are sensitive information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |