Moderate severityNVD Advisory· Published Apr 29, 2020· Updated Aug 4, 2024
HTTP request which redirect to another hostname do not strip authorization header in Actions Http-Client
CVE-2020-11021
Description
Actions Http-Client (NPM @actions/http-client) before version 1.0.8 can disclose Authorization headers to incorrect domain in certain redirect scenarios. The conditions in which this happens are if consumers of the http-client: 1. make an http request with an authorization header 2. that request leads to a redirect (302) and 3. the redirect url redirects to another domain or hostname Then the authorization header will get passed to the other domain. The problem is fixed in version 1.0.8.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@actions/http-clientnpm | < 1.0.8 | 1.0.8 |
Affected products
1- Range: < 1.0.8
Patches
1f6aae3dda4f4Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/advisories/GHSA-9w6v-m7wp-jwg4ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-11021ghsaADVISORY
- github.com/actions/http-client/commit/f6aae3dda4f4c9dc0b49737b36007330f78fd53aghsax_refsource_MISCWEB
- github.com/actions/http-client/pull/27ghsax_refsource_MISCWEB
- github.com/actions/http-client/security/advisories/GHSA-9w6v-m7wp-jwg4ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.