Learn about CVE-2022-31090 where the `CURLOPT_HTTPAUTH` option flaw in Guzzle exposes Authorization headers. Upgrade to secure versions immediately.
This CVE involves the
CURLOPT_HTTPAUTH
option not being cleared on a change of origin in Guzzle, a PHP HTTP client library. Users are advised to upgrade to specific versions immediately for security.
Understanding CVE-2022-31090
This vulnerability allows attackers to access sensitive
Authorization
headers on requests when a redirect to a URI with a different origin occurs in Guzzle.
What is CVE-2022-31090?
In affected versions of Guzzle, the
CURLOPT_HTTPAUTH
option can be used to specify an Authorization
header. If a redirect to a URI with a different origin happens, the Authorization
header should be removed before further requests to prevent unauthorized access.
The Impact of CVE-2022-31090
The vulnerability can lead to exposure of sensitive information to unauthorized actors, posing a risk of confidentiality breaches.
Technical Details of CVE-2022-31090
The affected systems are those running Guzzle versions < 6.5.8 and >=7.0.0, < 7.4.5. Users should upgrade to specific versions as mentioned to address the vulnerability.
Vulnerability Description
The flaw allows an attacker to access sensitive
Authorization
headers during redirects to a URI with a different origin in Guzzle, potentially leading to unauthorized access to confidential information.
Affected Systems and Versions
Versions of Guzzle < 6.5.8 and >=7.0.0, < 7.4.5 are vulnerable to this issue.
Exploitation Mechanism
Attackers can exploit this vulnerability by triggering a redirect to a URI with a different origin, allowing them to access sensitive
Authorization
headers.
Mitigation and Prevention
Users are advised to take immediate steps to address the CVE and implement long-term security practices to prevent similar vulnerabilities.
Immediate Steps to Take
Affected users should upgrade to specific versions of Guzzle (7.4.5 for Guzzle 7 users and 6.5.8 or 7.4.5 for earlier versions) to mitigate the vulnerability.
Long-Term Security Practices
To enhance security, users can disable redirects if not required or use the Guzzle steam handler backend instead of curl to prevent unauthorized access to
Authorization
headers.
Patching and Updates
Ensure that the Guzzle library is updated to the recommended versions to patch the vulnerability and protect systems from potential exploits.