GO-2025-3420

Source
https://pkg.go.dev/vuln/GO-2025-3420
Import Source
https://vuln.go.dev/ID/GO-2025-3420.json
JSON Data
https://api.osv.dev/v1/vulns/GO-2025-3420
Aliases
Published
2025-01-28T00:47:30Z
Modified
2025-01-30T20:12:08.973745Z
Summary
Sensitive headers incorrectly sent after cross-domain redirect in net/http
Details

The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com.

In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.

Database specific
{
    "review_status": "REVIEWED",
    "url": "https://pkg.go.dev/vuln/GO-2025-3420"
}
References
Credits
    • Kyle Seely

Affected packages

Go / stdlib

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.22.11
Introduced
1.23.0-0
Fixed
1.23.5
Introduced
1.24.0-0
Fixed
1.24.0-rc.2

Ecosystem specific

{
    "imports": [
        {
            "path": "net/http",
            "symbols": [
                "Client.Do",
                "Client.Get",
                "Client.Head",
                "Client.Post",
                "Client.PostForm",
                "Client.do",
                "Client.makeHeadersCopier",
                "Get",
                "Head",
                "Post",
                "PostForm",
                "shouldCopyHeaderOnRedirect"
            ]
        }
    ]
}