Source: guzzle X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security
Hi, The following vulnerabilities were published for guzzle. CVE-2022-31090[0]: | Guzzle, an extensible PHP HTTP client. `Authorization` headers on | requests are sensitive information. In affected versions when using | our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option | to specify an `Authorization` header. On making a request which | responds with a redirect to a URI with a different origin (change in | host, scheme or port), if we choose to follow it, we should remove the | `CURLOPT_HTTPAUTH` option before continuing, stopping curl from | appending the `Authorization` header to the new request. Affected | Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. | Affected users using any earlier series of Guzzle should upgrade to | Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in | Guzzle 7.4.2, where a change in host would trigger removal of the | curl-added Authorization header, however this earlier fix did not | cover change in scheme or change in port. If you do not require or | expect redirects to be followed, one should simply disable redirects | all together. Alternatively, one can specify to use the Guzzle steam | handler backend, rather than curl. https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82 (7.4.5) CVE-2022-31091[1]: | Guzzle, an extensible PHP HTTP client. `Authorization` and `Cookie` | headers on requests are sensitive information. In affected versions on | making a request which responds with a redirect to a URI with a | different port, if we choose to follow it, we should remove the | `Authorization` and `Cookie` headers from the request, before | containing. Previously, we would only consider a change in host or | scheme. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon | as possible. Affected users using any earlier series of Guzzle should | upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was | implemented in Guzzle 7.4.2, where a change in host would trigger | removal of the curl-added Authorization header, however this earlier | fix did not cover change in scheme or change in port. An alternative | approach would be to use your own redirect middleware, rather than | ours, if you are unable to upgrade. If you do not require or expect | redirects to be followed, one should simply disable redirects all | together. https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699 https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82 (7.4.5) If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-31090 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31090 [1] https://security-tracker.debian.org/tracker/CVE-2022-31091 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091 Please adjust the affected versions in the BTS as needed.