follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-0907 | follow-redirects is an open source, drop-in replacement for Node's `http` and `https` modules that automatically follows redirects. In affected versions follow-redirects only clears authorization header during cross-domain redirect, but keep the proxy-authentication header which contains credentials too. This vulnerability may lead to credentials leak, but has been addressed in version 1.15.6. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-cxjh-pqwp-8mfp | follow-redirects' Proxy-Authorization header kept across hosts |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 06 Dec 2025 01:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Follow-redirects Project
Follow-redirects Project follow-redirects |
|
| CPEs | cpe:2.3:a:follow-redirects_project:follow-redirects:*:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Follow-redirects Project
Follow-redirects Project follow-redirects |
Wed, 16 Jul 2025 22:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 18 Feb 2025 11:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat cluster Observability Operator
|
|
| CPEs | cpe:/a:redhat:cluster_observability_operator:1.0::el8 | |
| Vendors & Products |
Redhat cluster Observability Operator
|
Tue, 12 Nov 2024 00:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat acm
Redhat multicluster Engine |
|
| CPEs | cpe:/a:redhat:acm:2.10::el9 cpe:/a:redhat:multicluster_engine:2.5::el8 |
|
| Vendors & Products |
Redhat acm
Redhat multicluster Engine |
Thu, 31 Oct 2024 11:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat openshift Gitops
|
|
| CPEs | cpe:/a:redhat:openshift_gitops:1.12::el8 cpe:/a:redhat:openshift_gitops:1.12::el9 |
|
| Vendors & Products |
Redhat openshift Gitops
|
Thu, 26 Sep 2024 19:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat rhmt
|
|
| CPEs | cpe:/a:redhat:rhmt:1.8::el8 | |
| Vendors & Products |
Redhat rhmt
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-13T17:47:32.862Z
Reserved: 2024-03-11T22:45:07.685Z
Link: CVE-2024-28849
Updated: 2024-08-02T00:56:58.148Z
Status : Analyzed
Published: 2024-03-14T17:15:52.097
Modified: 2025-12-05T15:45:52.483
Link: CVE-2024-28849
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA