Skip to main content

CVE-2022-24719: CWE-359: Exposure of Private Personal Information to an Unauthorized Actor in fluture-js fluture-node

Medium
Published: Tue Mar 01 2022 (03/01/2022, 20:20:13 UTC)
Source: CVE
Vendor/Project: fluture-js
Product: fluture-node

Description

Fluture-Node is a FP-style HTTP and streaming utils for Node based on Fluture. Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the request to a server on a third-party domain, or the same domain over unencrypted HTTP, the headers would be included in the follow-up request and be exposed to the third party, or potential http traffic sniffing. The redirection strategies made available in version 4.0.2 automatically redact confidential headers when a redirect is followed across to another origin. A workaround has been identified by using a custom redirection strategy via the `followRedirectsWith` function. The custom strategy can be based on the new strategies available in fluture-node@4.0.2.

AI-Powered Analysis

AILast updated: 06/23/2025, 15:00:04 UTC

Technical Analysis

CVE-2022-24719 is a vulnerability affecting versions 4.0.0 and 4.0.1 of fluture-node, a functional programming style HTTP and streaming utility library for Node.js based on fluture-js. The issue arises when using the `followRedirects` or `followRedirectsWith` functions with the built-in redirection strategies. Specifically, if an HTTP request contains confidential headers such as Authorization or Cookie and the destination server issues a redirect to a different domain (a third-party origin) or to the same domain over an unencrypted HTTP connection, these sensitive headers are included in the redirected request. This behavior exposes private personal information to unauthorized actors, either by sending it to an unintended third-party server or by making it susceptible to interception via network sniffing on unencrypted HTTP traffic. The root cause is that the redirection strategies in versions 4.0.0 and 4.0.1 do not automatically redact or remove confidential headers when following redirects across origins or protocols. This can lead to leakage of authentication tokens or session cookies, potentially allowing attackers to hijack sessions or gain unauthorized access. The vulnerability was addressed in version 4.0.2, where the redirection strategies were updated to automatically redact confidential headers when redirects cross origins. Additionally, users of affected versions can implement a custom redirection strategy via `followRedirectsWith` to mitigate the issue by redacting sensitive headers before following redirects. There are no known exploits in the wild reported for this vulnerability, and no official patches beyond upgrading to version 4.0.2 or later. The vulnerability is classified under CWE-359, which relates to exposure of private personal information to unauthorized actors.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive authentication credentials or session tokens when using fluture-node versions 4.0.0 or 4.0.1 in their Node.js applications that perform HTTP requests with redirects. The exposure of Authorization or Cookie headers to third-party domains or over unencrypted HTTP can lead to session hijacking, unauthorized access to protected resources, and potential data breaches. This is particularly concerning for organizations handling personal data under GDPR, as unauthorized disclosure could lead to regulatory penalties and reputational damage. The impact is amplified in environments where microservices or third-party integrations rely on fluture-node for HTTP communication, especially if redirects are common and confidential headers are used. Although no active exploits are known, the ease of exploitation is moderate since an attacker would need to control or influence redirect destinations or intercept unencrypted traffic. The confidentiality of user credentials and session information is primarily at risk, while integrity and availability impacts are minimal. However, compromised credentials can indirectly lead to further attacks affecting integrity and availability. The scope includes any European organization using affected versions of fluture-node in production environments, particularly those in sectors with high security requirements such as finance, healthcare, and government.

Mitigation Recommendations

1. Upgrade fluture-node to version 4.0.2 or later, where the redirection strategies automatically redact confidential headers when following redirects across origins. 2. If upgrading is not immediately feasible, implement a custom redirection strategy using `followRedirectsWith` that explicitly removes or redacts Authorization, Cookie, and other sensitive headers before following redirects to different domains or unencrypted HTTP URLs. 3. Audit all HTTP requests in applications using fluture-node to identify those that include confidential headers and follow redirects, ensuring they are handled securely. 4. Enforce HTTPS usage strictly to prevent exposure of headers over unencrypted connections; consider implementing HTTP Strict Transport Security (HSTS) policies. 5. Monitor network traffic for unexpected outbound requests containing sensitive headers to unknown or third-party domains. 6. Educate developers on the risks of automatic header forwarding during redirects and encourage secure coding practices around HTTP client usage. 7. Review and limit the use of confidential headers in requests that may be redirected, avoiding sending sensitive headers unless absolutely necessary. 8. Incorporate security testing and code reviews focusing on HTTP client behavior and redirect handling in CI/CD pipelines.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf26fd

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 3:00:04 PM

Last updated: 8/11/2025, 4:12:42 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats