-
Notifications
You must be signed in to change notification settings - Fork 3
Description
Vulnerable Library - guzzlehttp/command-0.7.1
Found in HEAD commit: 39dbe5aff08e4f04412a5938451250b3845c4dff
Vulnerabilities
| Vulnerability | Severity | Exploit Maturity | EPSS | Dependency | Type | Fixed in (guzzlehttp/command version) | Remediation Possible** | Reachability | |
|---|---|---|---|---|---|---|---|---|---|
| CVE-2016-5385 | 8.1 | Not Defined | 83.0% | guzzlehttp/guzzle-5.3.x-dev | Transitive | N/A* | ❌ | ||
| CVE-2022-29248 | 8.0 | Not Defined | 0.6% | guzzlehttp/guzzle-5.3.x-dev | Transitive | N/A* | ❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2016-5385
Vulnerable Library - guzzlehttp/guzzle-5.3.x-dev
Guzzle is a PHP HTTP client library and framework for building RESTful web service clients
Library home page: https://api.github.com/repos/guzzle/guzzle/zipball/d59d5293b4a804d6436d64fec71a8c75110a3165
Dependency Hierarchy:
- guzzlehttp/command-0.7.1 (Root Library)
- ❌ guzzlehttp/guzzle-5.3.x-dev (Vulnerable Library)
Found in HEAD commit: 39dbe5aff08e4f04412a5938451250b3845c4dff
Found in base branch: main
Vulnerability Details
PHP through 7.0.8 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, as demonstrated by (1) an application that makes a getenv('HTTP_PROXY') call or (2) a CGI configuration of PHP, aka an "httpoxy" issue.
Publish Date: 2016-07-19
URL: CVE-2016-5385
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 83.0%
CVSS 3 Score Details (8.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
CVE-2022-29248
Vulnerable Library - guzzlehttp/guzzle-5.3.x-dev
Guzzle is a PHP HTTP client library and framework for building RESTful web service clients
Library home page: https://api.github.com/repos/guzzle/guzzle/zipball/d59d5293b4a804d6436d64fec71a8c75110a3165
Dependency Hierarchy:
- guzzlehttp/command-0.7.1 (Root Library)
- ❌ guzzlehttp/guzzle-5.3.x-dev (Vulnerable Library)
Found in HEAD commit: 39dbe5aff08e4f04412a5938451250b3845c4dff
Found in base branch: main
Vulnerability Details
Guzzle is a PHP HTTP client. Guzzle prior to versions 6.5.6 and 7.4.3 contains a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. The cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability. Guzzle versions 6.5.6 and 7.4.3 contain a patch for this issue. As a workaround, turn off the cookie middleware.
Publish Date: 2022-05-25
URL: CVE-2022-29248
Threat Assessment
Exploit Maturity: Not Defined
EPSS: 0.6%
CVSS 3 Score Details (8.0)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29248
Release Date: 2022-05-25
Fix Resolution: guzzlehttp/guzzle - 6.5.6,guzzlehttp/guzzle - 7.4.3