Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
CVE–2022–0536
Vulnerable dependency: follow-redirects (Yarn) 1.13.0
Vulnerability details
Description
Exposure of Sensitive Information to an Unauthorized Actor
NVD
GitHub
CVSS details - 5.9
References
NVD - CVE-2022-0536
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects · CVE-2022-0536 · GitHub Advisory Database · GitHub
Drop confidential headers across schemes. · follow-redirects/follow-redirects@62e546a · GitHub
Exposure of Sensitive Information to an Unauthorized Actor vulnerability found in follow-redirects
GitHub - follow-redirects/follow-redirects: Node.js module that automatically follows HTTP(S) redirects
follow-redirects/index.js at 8b347cbcef7c7b72a6e9be20f5710c17d6163c22 · follow-redirects/follow-redirects · GitHub
Related information
📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more about the CVE