PT-2022-3247 · Guzzle +1 · Guzzle +1
Published
2022-06-09
·
Updated
2025-08-12
·
CVE-2022-31042
7.8
High
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:N/A:N |
Name of the Vulnerable Software and Affected Versions:
Guzzle versions prior to 6.5.7
Guzzle versions prior to 7.4.4
Description:
The `Cookie` headers on requests are sensitive information. When making a request using the `https` scheme to a server that responds with a redirect to a URI with the `http` scheme, or when making a request to a server that responds with a redirect to a URI on a different host, the `Cookie` header should not be forwarded. Prior to the fix, only cookies managed by the cookie middleware were safely removed, while any manually added `Cookie` headers were not stripped. The issue allows a remote attacker to disclose protected information.
Recommendations:
For Guzzle versions prior to 6.5.7, upgrade to Guzzle 6.5.7 as soon as possible.
For Guzzle versions prior to 7.4.4, upgrade to Guzzle 7.4.4 as soon as possible.
If you are unable to upgrade, consider using your own redirect middleware instead of the default one.
If you do not require or expect redirects to be followed, simply disable redirects altogether.
Exploit
Fix
Improperly Implemented Security Check for Standard
Incorrect Authorization
Information Disclosure
Related Identifiers
Affected Products
References · 62
- 🔥 https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31042.yaml⭐ 2049 🔗 306 · Exploit
- https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8⭐ 23222 🔗 2402 · Patch
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34911 · Security Note
- https://cve.org/CVERecord?id=CVE-2022-31042 · Security Note
- https://bdu.fstec.ru/vul/2022-03942 · Security Note
- https://osv.dev/vulnerability/GHSA-f2wf-25xc-69c9 · Vendor Advisory
- https://bdu.fstec.ru/vul/2022-03953 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44854 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41767 · Security Note
- https://security-tracker.debian.org/tracker/DSA-5246-1 · Vendor Advisory
- https://drupal.org/sa-core-2022-011 · Patch
- https://advisories.mageia.org/MGASA-2022-0338.html · Security Note
- https://bdu.fstec.ru/vul/2022-06216 · Security Note
- https://bdu.fstec.ru/vul/2022-06215 · Security Note