| Name | CVE-2024-6104 | 
| Description | go-retryablehttp prior to 0.7.7 did not sanitize urls when writing them to its log file. This could lead to go-retryablehttp writing sensitive HTTP basic auth credentials to its log file. This vulnerability, CVE-2024-6104, was fixed in go-retryablehttp 0.7.7. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| Debian Bugs | 1076773 | 
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|---|---|---|
| golang-github-hashicorp-go-retryablehttp (PTS) | bullseye | 0.6.4-2 | vulnerable | 
| forky, sid, bookworm, trixie | 0.7.1-1 | vulnerable | 
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs | 
|---|---|---|---|---|---|---|
| golang-github-hashicorp-go-retryablehttp | source | (unstable) | (unfixed) | 1076773 | 
[trixie] - golang-github-hashicorp-go-retryablehttp <no-dsa> (Minor issue)
[bookworm] - golang-github-hashicorp-go-retryablehttp <no-dsa> (Minor issue)
[bullseye] - golang-github-hashicorp-go-retryablehttp <no-dsa> (Minor issue)
https://discuss.hashicorp.com/t/hcsec-2024-12-go-retryablehttp-can-leak-basic-auth-credentials-to-log-files/68027
https://github.com/hashicorp/go-retryablehttp/commit/a99f07beb3c5faaa0a283617e6eb6bcf25f5049a (v0.7.7)