{
  "document": {
    "aggregate_severity": {
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "* SECURITY UPDATE: Node.js undici cross-origin redirect vulnerability\n     - debian/patches/CVE-2023-45143.patch: clear Cookie and Host headers on\n       cross-origin redirects to prevent sensitive data leakage\n     - CVE-2023-45143",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_alt_nodejs/debian13/advisories/2025/clsa-2025_1766614361.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614361",
        "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614361"
      }
    ],
    "tracking": {
      "current_release_date": "2026-03-16T20:11:01Z",
      "generator": {
        "date": "2026-03-16T20:11:01Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1766614361",
      "initial_release_date": "2025-12-24T22:13:13Z",
      "revision_history": [
        {
          "date": "2025-12-24T22:13:13Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-03-16T20:11:01Z",
          "number": "2",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "Fix CVE(s): CVE-2023-45143"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Debian 13",
                "product": {
                  "name": "Debian 13",
                  "product_id": "Debian-13",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:debian:debian_linux:13:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Debian"
          }
        ],
        "category": "vendor",
        "name": "Software in the Public Interest, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-nodejs16-docs-0:16.20.2-9.amd64",
                "product": {
                  "name": "alt-nodejs16-docs-0:16.20.2-9.amd64",
                  "product_id": "alt-nodejs16-docs-0:16.20.2-9.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-nodejs16-docs@16.20.2-9?arch=amd64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
                "product": {
                  "name": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
                  "product_id": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-nodejs16-nodejs-devel@16.20.2-9?arch=amd64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs16-nodejs-0:16.20.2-9.amd64",
                "product": {
                  "name": "alt-nodejs16-nodejs-0:16.20.2-9.amd64",
                  "product_id": "alt-nodejs16-nodejs-0:16.20.2-9.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-nodejs16-nodejs@16.20.2-9?arch=amd64&os_name=debian&os_version=13"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64",
                "product": {
                  "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64",
                  "product_id": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64",
                  "product_identification_helper": {
                    "purl": "pkg:deb/tuxcare/alt-nodejs16-npm@8.19.4-16.20.2.9?arch=amd64&os_name=debian&os_version=13"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "amd64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-docs-0:16.20.2-9.amd64 as a component of Debian 13",
          "product_id": "Debian-13:alt-nodejs16-docs-0:16.20.2-9.amd64"
        },
        "product_reference": "alt-nodejs16-docs-0:16.20.2-9.amd64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64 as a component of Debian 13",
          "product_id": "Debian-13:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64"
        },
        "product_reference": "alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-nodejs-0:16.20.2-9.amd64 as a component of Debian 13",
          "product_id": "Debian-13:alt-nodejs16-nodejs-0:16.20.2-9.amd64"
        },
        "product_reference": "alt-nodejs16-nodejs-0:16.20.2-9.amd64",
        "relates_to_product_reference": "Debian-13"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64 as a component of Debian 13",
          "product_id": "Debian-13:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
        },
        "product_reference": "alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64",
        "relates_to_product_reference": "Debian-13"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-45143",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-13:alt-nodejs16-docs-0:16.20.2-9.amd64",
          "Debian-13:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
          "Debian-13:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
          "Debian-13:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-nodejs/cve/CVE-2023-45143"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76",
          "url": "https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/releases/tag/v5.26.2",
          "url": "https://github.com/nodejs/undici/releases/tag/v5.26.2"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp",
          "url": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g",
          "url": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g"
        },
        {
          "category": "external",
          "summary": "https://hackerone.com/reports/2166948",
          "url": "https://hackerone.com/reports/2166948"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"
        }
      ],
      "release_date": "2023-10-12T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:12:43.029268Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614361",
          "product_ids": [
            "Debian-13:alt-nodejs16-docs-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614361"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "Debian-13:alt-nodejs16-docs-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2023-39333",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code ('Code Injection')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Maliciously crafted export names in an imported WebAssembly module can inject JavaScript code. The injected code may be able to access data and functions that the WebAssembly module itself does not have access to, similar to as if the WebAssembly module was a JavaScript module.\nThis vulnerability affects users of any active release line of Node.js. The vulnerable feature is only available if Node.js is started with the `--experimental-wasm-modules` command line option.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "Debian-13:alt-nodejs16-docs-0:16.20.2-9.amd64",
          "Debian-13:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
          "Debian-13:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
          "Debian-13:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-nodejs/cve/CVE-2023-39333"
        }
      ],
      "release_date": "2023-10-13T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:12:43.029268Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614361",
          "product_ids": [
            "Debian-13:alt-nodejs16-docs-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614361"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "Debian-13:alt-nodejs16-docs-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-nodejs-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-nodejs-devel-0:16.20.2-9.amd64",
            "Debian-13:alt-nodejs16-npm-0:8.19.4-16.20.2.9.amd64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}