NestJS Proxy vulnerability in @finastra/nestjs-proxy versions < 0.7.0 could expose sensitive information. Learn about impact, mitigation steps, and prevention.
NestJS Proxy is a NestJS module used for decorating and proxying calls. A vulnerability existed in versions prior to 0.7.0 of the
@finastra/nestjs-proxy
package where Authorization headers could be forwarded unintentionally, potentially exposing sensitive information to unauthorized actors. The issue has been addressed in version 0.7.0 by introducing a new configuration setting to control the forwarding of Authorization headers.
Understanding CVE-2022-31069
This CVE highlights a security concern in the
@finastra/nestjs-proxy
package that could lead to the exposure of sensitive information.
What is CVE-2022-31069?
The vulnerability in
@finastra/nestjs-proxy
allowed for the inadvertent exposure of sensitive data, such as OAuth bearer access tokens, due to the lack of control over the forwarding of Authorization headers.
The Impact of CVE-2022-31069
The impact of this vulnerability is rated as MEDIUM with a CVSS base score of 5.8. It could result in high confidentiality and integrity impact if exploited by a malicious actor with high privileges.
Technical Details of CVE-2022-31069
This section outlines the specifics of the vulnerability.
Vulnerability Description
The issue stemmed from a lack of control over when Authorization headers were forwarded, potentially exposing sensitive information to unauthorized actors.
Affected Systems and Versions
Versions of
@finastra/nestjs-proxy
prior to 0.7.0 are affected by this vulnerability.
Exploitation Mechanism
Exploitation of this vulnerability could lead to the exposure of sensitive information, impacting confidentiality and integrity.
Mitigation and Prevention
To address CVE-2022-31069, immediate steps can be taken to secure systems and prevent exploitation.
Immediate Steps to Take
Application developers are advised to update to version 0.7.0 of
@finastra/nestjs-proxy
and configure the new forwardToken
setting to control Authorization header forwarding.
Long-Term Security Practices
In the long term, developers should prioritize maintaining up-to-date dependencies and following secure coding practices to prevent similar vulnerabilities.
Patching and Updates
Regularly check for security updates and patches for dependencies to ensure that known vulnerabilities are addressed in a timely manner.