hackariens / laravel

Templates pour la création d'un nouveau projet laravel
0 stars 0 forks source link

fix(deps): update dependency guzzlehttp/guzzle to v7.4.5 [security] - autoclosed #89

Closed renovate[bot] closed 1 year ago

renovate[bot] commented 2 years ago

Mend Renovate

This PR contains the following updates:

Package Type Update Change
guzzlehttp/guzzle (source) require minor 7.2.0 -> 7.4.5

GitHub Vulnerability Alerts

CVE-2022-29248

Impact

Previous version of Guzzle contain a vulnerability with the cookie middleware. The vulnerability is that it is not checked if the cookie domain equals the domain of the server which sets the cookie via the Set-Cookie header, allowing a malicious server to set cookies for unrelated domains. For example an attacker at www.example.com might set a session cookie for api.example.net, logging the Guzzle client into their account and retrieving private API requests from the security log of their account.

Note that our cookie middleware is disabled by default, so most library consumers will not be affected by this issue. Only those who manually add the cookie middleware to the handler stack or construct the client with ['cookies' => true] are affected. Moreover, those who do not use the same Guzzle client to call multiple domains and have disabled redirect forwarding are not affected by this vulnerability.

Patches

Affected Guzzle 7 users should upgrade to Guzzle 7.4.3 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.6 or 7.4.3.

Workarounds

If you do not need support for cookies, turn off the cookie middleware. It is already off by default, but if you have turned it on and no longer need it, turn it off.

References

For more information

If you have any questions or comments about this advisory, please get in touch with us in #guzzle on the PHP HTTP Slack. Do not report additional security advisories in that public channel, however - please follow our vulnerability reporting process.

CVE-2022-31042

Impact

Cookie headers on requests are sensitive information. On making a request using the https scheme to a server which responds with a redirect to a URI with the http scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the Cookie header on. Prior to this fix, only cookies that were managed by our cookie middleware would be safely removed, and any Cookie header manually added to the initial request would not be stripped. We now always strip it, and allow the cookie middleware to re-add any cookies that it deems should be there.

Patches

Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4.

Workarounds

An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.

References

For more information

If you have any questions or comments about this advisory, please get in touch with us in #guzzle on the PHP HTTP Slack. Do not report additional security advisories in that public channel, however - please follow our vulnerability reporting process.

CVE-2022-31043

Impact

Authorization headers on requests are sensitive information. On making a request using the https scheme to a server which responds with a redirect to a URI with the http scheme, we should not forward the Authorization header on. This is much the same as to how we don't forward on the header if the host changes. Prior to this fix, https to http downgrades did not result in the Authorization header being removed, only changes to the host.

Patches

Affected Guzzle 7 users should upgrade to Guzzle 7.4.4 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.7 or 7.4.4.

Workarounds

An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.

References

For more information

If you have any questions or comments about this advisory, please get in touch with us in #guzzle on the PHP HTTP Slack. Do not report additional security advisories in that public channel, however - please follow our vulnerability reporting process.

CVE-2022-31090

Impact

Authorization headers on requests are sensitive information. When using our Curl handler, it is possible to use the CURLOPT_HTTPAUTH option to specify an Authorization header. On making a request which responds with a redirect to a URI with a different origin, if we choose to follow it, we should remove the CURLOPT_HTTPAUTH and CURLOPT_USERPWD options before continuing, stopping curl from appending the Authorization header to the new request. Previously, we would only consider a change in host. Now, we consider any change in host, port or scheme to be a change in origin.

Patches

Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port.

Workarounds

If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle stream handler backend, rather than curl.

References

For more information

If you have any questions or comments about this advisory, please get in touch with us in #guzzle on the PHP HTTP Slack. Do not report additional security advisories in that public channel, however - please follow our vulnerability reporting process.

CVE-2022-31091

Impact

Authorization and Cookie headers on requests are sensitive information. On making a request which responds with a redirect to a URI with a different port, if we choose to follow it, we should remove the Authorization and Cookie headers from the request, before containing. Previously, we would only consider a change in host or scheme downgrade. Now, we consider any change in host, port or scheme to be a change in origin.

Patches

Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5.

Workarounds

An alternative approach would be to use your own redirect middleware, rather than ours, if you are unable to upgrade. If you do not require or expect redirects to be followed, one should simply disable redirects all together.

References

For more information

If you have any questions or comments about this advisory, please get in touch with us in #guzzle on the PHP HTTP Slack. Do not report additional security advisories in that public channel, however please follow our vulnerability reporting process.


Release Notes

guzzle/guzzle ### [`v7.4.5`](https://togithub.com/guzzle/guzzle/blob/HEAD/CHANGELOG.md#​745---2022-06-20) [Compare Source](https://togithub.com/guzzle/guzzle/compare/7.4.4...7.4.5) - Fix change in port should be considered a change in origin - Fix `CURLOPT_HTTPAUTH` option not cleared on change of origin ### [`v7.4.4`](https://togithub.com/guzzle/guzzle/blob/HEAD/CHANGELOG.md#​744---2022-06-09) [Compare Source](https://togithub.com/guzzle/guzzle/compare/7.4.3...7.4.4) - Fix failure to strip Authorization header on HTTP downgrade - Fix failure to strip the Cookie header on change in host or HTTP downgrade ### [`v7.4.3`](https://togithub.com/guzzle/guzzle/blob/HEAD/CHANGELOG.md#​743---2022-05-25) [Compare Source](https://togithub.com/guzzle/guzzle/compare/7.4.2...7.4.3) - Fix cross-domain cookie leakage ### [`v7.4.2`](https://togithub.com/guzzle/guzzle/blob/HEAD/CHANGELOG.md#​742---2022-03-20) [Compare Source](https://togithub.com/guzzle/guzzle/compare/7.4.1...7.4.2) ##### Fixed - Remove curl auth on cross-domain redirects to align with the Authorization HTTP header - Reject non-HTTP schemes in StreamHandler - Set a default ssl.peer_name context in StreamHandler to allow `force_ip_resolve` ### [`v7.4.1`](https://togithub.com/guzzle/guzzle/blob/HEAD/CHANGELOG.md#​741---2021-12-06) [Compare Source](https://togithub.com/guzzle/guzzle/compare/7.4.0...7.4.1) ##### Changed - Replaced implicit URI to string coercion [#​2946](https://togithub.com/guzzle/guzzle/pull/2946) - Allow `symfony/deprecation-contracts` version 3 [#​2961](https://togithub.com/guzzle/guzzle/pull/2961) ##### Fixed - Only close curl handle if it's done [#​2950](https://togithub.com/guzzle/guzzle/pull/2950) ### [`v7.4.0`](https://togithub.com/guzzle/guzzle/blob/HEAD/CHANGELOG.md#​740---2021-10-18) [Compare Source](https://togithub.com/guzzle/guzzle/compare/7.3.0...7.4.0) ##### Added - Support PHP 8.1 [#​2929](https://togithub.com/guzzle/guzzle/pull/2929), [#​2939](https://togithub.com/guzzle/guzzle/pull/2939) - Support `psr/log` version 2 and 3 [#​2943](https://togithub.com/guzzle/guzzle/pull/2943) ##### Fixed - Make sure we always call `restore_error_handler()` [#​2915](https://togithub.com/guzzle/guzzle/pull/2915) - Fix progress parameter type compatibility between the cURL and stream handlers [#​2936](https://togithub.com/guzzle/guzzle/pull/2936) - Throw `InvalidArgumentException` when an incorrect `headers` array is provided [#​2916](https://togithub.com/guzzle/guzzle/pull/2916), [#​2942](https://togithub.com/guzzle/guzzle/pull/2942) ##### Changed - Be more strict with types [#​2914](https://togithub.com/guzzle/guzzle/pull/2914), [#​2917](https://togithub.com/guzzle/guzzle/pull/2917), [#​2919](https://togithub.com/guzzle/guzzle/pull/2919), [#​2945](https://togithub.com/guzzle/guzzle/pull/2945) ### [`v7.3.0`](https://togithub.com/guzzle/guzzle/blob/HEAD/CHANGELOG.md#​730---2021-03-23) [Compare Source](https://togithub.com/guzzle/guzzle/compare/7.2.0...7.3.0) ##### Added - Support for DER and P12 certificates [#​2413](https://togithub.com/guzzle/guzzle/pull/2413) - Support the cURL (http://) scheme for StreamHandler proxies [#​2850](https://togithub.com/guzzle/guzzle/pull/2850) - Support for `guzzlehttp/psr7:^2.0` [#​2878](https://togithub.com/guzzle/guzzle/pull/2878) ##### Fixed - Handle exceptions on invalid header consistently between PHP versions and handlers [#​2872](https://togithub.com/guzzle/guzzle/pull/2872)

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.



This PR has been generated by Mend Renovate. View repository job log here.