Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-31090 : What You Need to Know

Learn about CVE-2022-31090 where the `CURLOPT_HTTPAUTH` option flaw in Guzzle exposes Authorization headers. Upgrade to secure versions immediately.

This CVE involves the

CURLOPT_HTTPAUTH
option not being cleared on a change of origin in Guzzle, a PHP HTTP client library. Users are advised to upgrade to specific versions immediately for security.

Understanding CVE-2022-31090

This vulnerability allows attackers to access sensitive

Authorization
headers on requests when a redirect to a URI with a different origin occurs in Guzzle.

What is CVE-2022-31090?

In affected versions of Guzzle, the

CURLOPT_HTTPAUTH
option can be used to specify an
Authorization
header. If a redirect to a URI with a different origin happens, the
Authorization
header should be removed before further requests to prevent unauthorized access.

The Impact of CVE-2022-31090

The vulnerability can lead to exposure of sensitive information to unauthorized actors, posing a risk of confidentiality breaches.

Technical Details of CVE-2022-31090

The affected systems are those running Guzzle versions < 6.5.8 and >=7.0.0, < 7.4.5. Users should upgrade to specific versions as mentioned to address the vulnerability.

Vulnerability Description

The flaw allows an attacker to access sensitive

Authorization
headers during redirects to a URI with a different origin in Guzzle, potentially leading to unauthorized access to confidential information.

Affected Systems and Versions

Versions of Guzzle < 6.5.8 and >=7.0.0, < 7.4.5 are vulnerable to this issue.

Exploitation Mechanism

Attackers can exploit this vulnerability by triggering a redirect to a URI with a different origin, allowing them to access sensitive

Authorization
headers.

Mitigation and Prevention

Users are advised to take immediate steps to address the CVE and implement long-term security practices to prevent similar vulnerabilities.

Immediate Steps to Take

Affected users should upgrade to specific versions of Guzzle (7.4.5 for Guzzle 7 users and 6.5.8 or 7.4.5 for earlier versions) to mitigate the vulnerability.

Long-Term Security Practices

To enhance security, users can disable redirects if not required or use the Guzzle steam handler backend instead of curl to prevent unauthorized access to

Authorization
headers.

Patching and Updates

Ensure that the Guzzle library is updated to the recommended versions to patch the vulnerability and protect systems from potential exploits.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now