{"id":"AZL-37462","summary":"CVE-2023-45289 affecting package golang for versions less than 1.21.6-1","details":"When following an HTTP redirect to a domain which is not a subdomain match or exact match of the initial domain, an http.Client does not forward sensitive headers such as \"Authorization\" or \"Cookie\". For example, a redirect from foo.com to www.foo.com will forward the Authorization header, but a redirect to bar.com will not. A maliciously crafted HTTP redirect could cause sensitive headers to be unexpectedly forwarded.","modified":"2026-04-01T05:12:31.375537Z","published":"2024-03-05T23:15:07Z","upstream":["CVE-2023-45289"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45289"}],"affected":[{"package":{"name":"golang","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/golang"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"1.18.0"},{"fixed":"1.21.6-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-37462.json"}}],"schema_version":"1.7.5"}