FreeBSD : py-httpie -- exposure of sensitive information vulnerabilities (1e37fa3e-5988-4991-808f-eae98047e2af)

medium Nessus Plugin ID 180381

Language:

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 1e37fa3e-5988-4991-808f-eae98047e2af advisory.

- Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository httpie/httpie prior to 3.1.0. (CVE-2022-0430)

- HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. Before 3.1.0, HTTPie didnt distinguish between cookies and hosts they belonged.
This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. Users are advised to upgrade. There are no known workarounds.
(CVE-2022-24737)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://osv.dev/vulnerability/GHSA-6pc9-xqrg-wfqw

https://osv.dev/vulnerability/GHSA-9w4w-cpc8-h2fq

https://osv.dev/vulnerability/PYSEC-2022-167

https://osv.dev/vulnerability/PYSEC-2022-34

http://www.nessus.org/u?0cad5ba2

Plugin Details

Severity: Medium

ID: 180381

File Name: freebsd_pkg_1e37fa3e59884991808feae98047e2af.nasl

Version: 1.0

Type: local

Published: 8/31/2023

Updated: 8/31/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2022-0430

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2022-24737

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:py310-httpie, p-cpe:/a:freebsd:freebsd:py311-httpie, p-cpe:/a:freebsd:freebsd:py37-httpie, p-cpe:/a:freebsd:freebsd:py38-httpie, p-cpe:/a:freebsd:freebsd:py39-httpie, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/31/2023

Vulnerability Publication Date: 3/7/2022

Reference Information

CVE: CVE-2022-0430, CVE-2022-24737