Name | CVE-2022-31033 |
Description | The Mechanize library is used for automating interaction with websites. Mechanize automatically stores and sends cookies, follows redirects, and can follow links and submit forms. In versions prior to 2.8.5 the Authorization header is leaked after a redirect to a different port on the same site. Users are advised to upgrade to Mechanize v2.8.5 or later. There are no known workarounds for this issue. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1014809 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
ruby-mechanize (PTS) | bullseye | 2.7.7-1 | vulnerable |
bookworm | 2.8.5-1 | fixed | |
sid, trixie | 2.10.1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
ruby-mechanize | source | (unstable) | 2.8.5-1 | 1014809 |
[bullseye] - ruby-mechanize <no-dsa> (Minor issue)
[buster] - ruby-mechanize <no-dsa> (Minor issue)
https://github.com/sparklemotion/mechanize/security/advisories/GHSA-64qm-hrgp-pgr9
Prerequisite to clear credential headers when redirecting to cross site
https://github.com/sparklemotion/mechanize/commit/17e5381032c90caf240ac3d2e52b353f40c18d83 (v2.8.0)
Fixed by: https://github.com/sparklemotion/mechanize/commit/907c778001625cb9daa686d5019c939cb416e45b (v2.8.5)