{"id":"AZL-56058","summary":"CVE-2024-45336 affecting package msft-golang for versions less than 1.23.3-2","details":"The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.","modified":"2026-04-01T05:18:47.999581Z","published":"2025-01-28T02:15:28Z","upstream":["CVE-2024-45336"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-45336"}],"affected":[{"package":{"name":"msft-golang","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/msft-golang"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.23.3-2"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-56058.json"}}],"schema_version":"1.7.5"}