Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
CVE–2022–0235![shield](https://camo.githubusercontent.com/54fe2cfb86a8173d4d606898f75a9d84e8412144169b9624adcb3d7f31459ede/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6d656469756d332d322d30312e737667)
Vulnerable dependency: node-fetch (npm)
3.0.0-beta.9
Vulnerability details
Description
URL Redirection to Untrusted Site ('Open Redirect')
NVD
GitHub
CVSS details -
6.1
References
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor · CVE-2022-0235 · GitHub Advisory Database · GitHub![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
![link](https://camo.githubusercontent.com/4a515ad49f4d2866ad4954f3c26852ce00f654ca3e734a2d6d2c3351b380b7e2/68747470733a2f2f6465627269636b65642e636f6d2f6d656469612f696d616765732f64656661756c745f696d616765732f6d61726b646f776e2f70756c6c5f726571756573742f6c696e6b2d70722d30312e737667)
NVD - CVE-2022-0235
Exposure of Sensitive Information to an Unauthorized Actor vulnerability found in node-fetch
3.1.1 release (#1451) · node-fetch/node-fetch@36e47e8 · GitHub
Create SECURITY.md by JamieSlome · Pull Request #1445 · node-fetch/node-fetch · GitHub
Potential security issue · Issue #1443 · node-fetch/node-fetch · GitHub
GitHub - node-fetch/node-fetch: A light-weight module that brings the Fetch API to Node.js
backport of #1449 by jimmywarting · Pull Request #1453 · node-fetch/node-fetch · GitHub
fix(Headers): don't forward secure headers to 3th party by jimmywarting · Pull Request #1449 · node-fetch/node-fetch · GitHub
fix(Headers): don't forward secure headers to 3th party · node-fetch/node-fetch@5c32f00 · GitHub
Related information
📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more about the CVE