6.5
CVSSv3

CVE-2022-24737

Published: 07/03/2022 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

HTTPie is a command-line HTTP client. HTTPie has the practical concept of sessions, which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. prior to 3.1.0, HTTPie didn‘t distinguish between cookies and hosts they belonged. This behavior resulted in the exposure of some cookies when there are redirects originating from the actual host to a third party website. Users are advised to upgrade. There are no known workarounds.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

httpie httpie

fedoraproject fedora 34

fedoraproject fedora 35

fedoraproject fedora 36

Vendor Advisories

Debian Bug report logs - #1008011 httpie: CVE-2022-24737 Package: src:httpie; Maintainer for src:httpie is Bartosz Fenski <fenio@debianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 20 Mar 2022 14:45:01 UTC Severity: important Tags: security, upstream Found in version httpie/260-11 R ...