Home

Description

LWP::UserAgent versions before 6.83 for Perl leak Authorization and Proxy-Authorization headers on cross-origin redirects. On a 3xx response, the redirect handler strips only Host and Cookie before issuing the follow-up request. Caller-supplied Authorization and Proxy-Authorization headers are sent unchanged to the redirect target, including across scheme, host, or port changes. A redirect to an attacker controlled host therefore discloses the caller's credentials to that host.

PUBLISHED Reserved 2026-05-11 | Published 2026-05-12 | Updated 2026-05-19 | Assigner CPANSec

Problem types

CWE-522 Insufficiently Protected Credentials

Product status

Default status
unaffected

Any version before 6.83
affected

Timeline

2026-05-11:Issue reported.
2026-05-12:libwww-perl 6.83 released with fix.

Credits

Kai Aizen reporter

References

www.openwall.com/lists/oss-security/2026/05/12/7

github.com/...9c4aeb6f2dd32f2b7eaf2d7827cade31ea6cb2c6.patch patch

metacpan.org/release/OALDERS/libwww-perl-6.83/changes release-notes

github.com/libwww-perl/libwww-perl/pull/512 issue-tracking

github.com/libwww-perl/libwww-perl/pull/284 related

cve.org (CVE-2026-8368)

nvd.nist.gov (CVE-2026-8368)

Download JSON