Description
Deno is a JavaScript, TypeScript, and WebAssembly runtime with secure defaults. When you send a request with the Authorization header to one domain, and the response asks to redirect to a different domain, Deno'sfetch() redirect handling creates a follow-up redirect request that keeps the original Authorization header, leaking its content to that second domain. This vulnerability is fixed in 2.1.2.
Problem types
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
Product status
References
github.com/...d/deno/security/advisories/GHSA-f27p-cmv8-xhm6
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.