{
  "document": {
    "aggregate_severity": {
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: Node.js undici cross-origin redirect vulnerability\n     - debian/patches/CVE-2023-45143.patch: clear Cookie and Host headers on\n       cross-origin redirects to prevent sensitive data leakage\n     - CVE-2023-45143",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_alt_nodejs/debian10/advisories/2025/clsa-2025_1766614923.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614923",
        "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614923"
      }
    ],
    "tracking": {
      "current_release_date": "2025-12-24T22:22:35Z",
      "generator": {
        "date": "2025-12-24T22:22:35Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1766614923",
      "initial_release_date": "2025-12-24T22:22:35Z",
      "revision_history": [
        {
          "date": "2025-12-24T22:22:35Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "Fix CVE(s): CVE-2023-45143"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian 10",
                "product": {
                  "name": "Debian 10",
                  "product_id": "Debian-10",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:debian:debian_linux:10:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Debian"
          }
        ],
        "category": "vendor",
        "name": "Software in the Public Interest, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-nodejs16-nodejs-0:16.20.2-9.amd64",
                "product": {
                  "name": "alt-nodejs16-nodejs-0:16.20.2-9.amd64",
                  "product_id": "alt-nodejs16-nodejs-0:16.20.2-9.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-nodejs16-nodejs@16.20.2-9?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs16-docs-0:16.20.2-9.amd64",
                "product": {
                  "name": "alt-nodejs16-docs-0:16.20.2-9.amd64",
                  "product_id": "alt-nodejs16-docs-0:16.20.2-9.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-nodejs16-docs@16.20.2-9?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
                "product": {
                  "name": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
                  "product_id": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-nodejs16-nodejs-devel@16.20.2-9?arch=amd64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64",
                "product": {
                  "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64",
                  "product_id": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-nodejs16-npm@8.19.4-16.20.2.9?arch=amd64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-nodejs-0:16.20.2-9.amd64 as a component of Debian 10",
          "product_id": "Debian-10:alt-nodejs16-nodejs-0:16.20.2-9.amd64"
        },
        "product_reference": "alt-nodejs16-nodejs-0:16.20.2-9.amd64",
        "relates_to_product_reference": "Debian-10"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-docs-0:16.20.2-9.amd64 as a component of Debian 10",
          "product_id": "Debian-10:alt-nodejs16-docs-0:16.20.2-9.amd64"
        },
        "product_reference": "alt-nodejs16-docs-0:16.20.2-9.amd64",
        "relates_to_product_reference": "Debian-10"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64 as a component of Debian 10",
          "product_id": "Debian-10:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64"
        },
        "product_reference": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
        "relates_to_product_reference": "Debian-10"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64 as a component of Debian 10",
          "product_id": "Debian-10:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
        },
        "product_reference": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64",
        "relates_to_product_reference": "Debian-10"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-45143",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-10:alt-nodejs16-docs-0:16.20.2-9.amd64",
          "Debian-10:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
          "Debian-10:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
          "Debian-10:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-nodejs/cve/CVE-2023-45143"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76",
          "url": "https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/releases/tag/v5.26.2",
          "url": "https://github.com/nodejs/undici/releases/tag/v5.26.2"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp",
          "url": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g",
          "url": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g"
        },
        {
          "category": "external",
          "summary": "https://hackerone.com/reports/2166948",
          "url": "https://hackerone.com/reports/2166948"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"
        }
      ],
      "release_date": "2023-10-12T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:22:05.158069Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614923",
          "product_ids": [
            "Debian-10:alt-nodejs16-docs-0:16.20.2-9.amd64",
            "Debian-10:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
            "Debian-10:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
            "Debian-10:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614923"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "Debian-10:alt-nodejs16-docs-0:16.20.2-9.amd64",
            "Debian-10:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
            "Debian-10:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
            "Debian-10:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    }
  ]
}