Vulnerabilities/

Exposure of Sensitive Information in simple-get

Severity:
High

Description

In versions of simple-get prior to 4.0.1, 3.1.1, and 2.8.2, when fetching a remote url with a cookie location response, headers will be followed, potentially resulting in an exposure of the session cookie to a third party.

Recommendation

Update the simple-get package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
simple-get
Anything's wrong? Let us know Last updated on February 03, 2023

This issue is available in SmartScanner Professional

See Pricing