漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Feathers exposes internal headers via unencrypted session cookie
Vulnerability Description
Feathersjs is a framework for creating web APIs and real-time applications with TypeScript or JavaScript. In versions 5.0.39 and below, all HTTP request headers are stored in the session cookie, which is signed but not encrypted, exposing internal proxy/gateway headers to clients. The OAuth service stores the complete headers object in the session, then the session is persisted using cookie-session, which base64-encodes the data. While the cookie is signed to prevent tampering, the contents are readable by anyone by simply decoding the base64 value. Under specific deployment configurations (e.g., behind reverse proxies or API gateways), this can lead to exposure of sensitive internal infrastructure details such as API keys, service tokens, and internal IP addresses. This issue has been fixed in version 5.0.40.
CVSS Information
N/A
Vulnerability Type
信息暴露
Vulnerability Title
Feathers 信息泄露漏洞
Vulnerability Description
Feathers是Feathers开源的一个轻量级的 Web 框架。用于使用 TypeScript 或 JavaScript 创建 API 和实时应用程序。 Feathers 5.0.39及之前版本存在信息泄露漏洞,该漏洞源于所有HTTP请求标头都存储在会话cookie中,该cookie已签名但未加密,可能向客户端暴露内部代理或网关标头,导致敏感内部基础设施详细信息泄露。
CVSS Information
N/A
Vulnerability Type
N/A