Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. typed-rest-client
  4. ›
  5. CVE-2023-30846

CVE-2023-30846: Insufficiently Protected Credentials

April 26, 2023 (updated June 1, 2023)

typed-rest-client is a library for Node Rest and Http Clients with typings for use with TypeScript. Users of the typed-rest-client library version 1.7.3 or lower is vulnerable to leak authentication data to 3rd parties. The flow of the vulnerability is as follows: First, send any request with BasicCredentialHandler, BearerCredentialHandler or PersonalAccessTokenCredentialHandler. Second, the target host may return a redirection (3xx), with a link to a second host. Third, the next request will use the credentials to authenticate with the second host, by setting the Authorization header. The expected behavior is that the next request will NOT set the Authorization header. The problem was fixed in version 1.8.0. There are no known workarounds.

References

  • github.com/advisories/GHSA-558p-m34m-vpmq
  • github.com/microsoft/typed-rest-client/commit/f9ff755631b982ee1303dfc3e3c823d0d31233e8
  • github.com/microsoft/typed-rest-client/pull/207
  • github.com/microsoft/typed-rest-client/security/advisories/GHSA-558p-m34m-vpmq
  • nvd.nist.gov/vuln/detail/CVE-2023-30846

Code Behaviors & Features

Detect and mitigate CVE-2023-30846 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.8.0

Fixed versions

  • 1.8.0

Solution

Upgrade to version 1.8.0 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Source file

npm/typed-rest-client/CVE-2023-30846.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:19 +0000.