Source: libwww-perl
Version: 6.82-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for libwww-perl.

CVE-2026-8368[0]:
| LWP::UserAgent versions before 6.83 for Perl leak Authorization and
| Proxy-Authorization headers on cross-origin redirects.  On a 3xx
| response, the redirect handler strips only Host and Cookie before
| issuing the follow-up request. Caller-supplied Authorization and
| Proxy-Authorization headers are sent unchanged to the redirect
| target, including across scheme, host, or port changes.  A redirect
| to an attacker controlled host therefore discloses the caller's
| credentials to that host.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-8368
    https://www.cve.org/CVERecord?id=CVE-2026-8368
[1] https://lists.security.metacpan.org/cve-announce/msg/39974665/
[2] https://github.com/libwww-perl/libwww-perl/pull/512
[3] https://github.com/libwww-perl/libwww-perl/pull/284

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to