{
  "document": {
    "aggregate_severity": {
      "text": "Low"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2023-45143: clear Cookie and Host headers on cross-origin redirects to\n  prevent sensitive data leakage",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_alt_nodejs/el8/advisories/2025/clsa-2025_1766614566.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614566",
        "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614566"
      }
    ],
    "tracking": {
      "current_release_date": "2025-12-24T22:16:37Z",
      "generator": {
        "date": "2025-12-24T22:16:37Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1766614566",
      "initial_release_date": "2025-12-24T22:16:37Z",
      "revision_history": [
        {
          "date": "2025-12-24T22:16:37Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "alt-nodejs16-nodejs: Fix of CVE-2023-45143"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 8",
                "product": {
                  "name": "Community Enterprise Operating System 8",
                  "product_id": "CentOS-8",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:8:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          }
        ],
        "category": "vendor",
        "name": "Cloud Linux Software, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64",
                "product": {
                  "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64",
                  "product_id": "alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-nodejs16-npm@8.19.4-16.20.2.8.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64",
                "product": {
                  "name": "alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64",
                  "product_id": "alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-nodejs16-nodejs-devel@16.20.2-8.el8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64",
                "product": {
                  "name": "alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64",
                  "product_id": "alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-nodejs16-nodejs@16.20.2-8.el8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch",
                "product": {
                  "name": "alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch",
                  "product_id": "alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/alt-nodejs16-nodejs-docs@16.20.2-8.el8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-8:alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64"
        },
        "product_reference": "alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64",
        "relates_to_product_reference": "CentOS-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-8:alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64"
        },
        "product_reference": "alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64",
        "relates_to_product_reference": "CentOS-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-8:alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch"
        },
        "product_reference": "alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch",
        "relates_to_product_reference": "CentOS-8"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64 as a component of Community Enterprise Operating System 8",
          "product_id": "CentOS-8:alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64"
        },
        "product_reference": "alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64",
        "relates_to_product_reference": "CentOS-8"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-45143",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "description",
          "text": "Undici is an HTTP/1.1 client written from scratch for Node.js. Prior to version 5.26.2, Undici already cleared Authorization headers on cross-origin redirects, but did not clear `Cookie` headers. By design, `cookie` headers are forbidden request headers, disallowing them to be set in RequestInit.headers in browser environments. Since undici handles headers more liberally than the spec, there was a disconnect from the assumptions the spec made, and undici's implementation of fetch. As such this may lead to accidental leakage of cookie to a third-party site or a malicious attacker who can control the redirection target (ie. an open redirector) to leak the cookie to the third party site. This was patched in version 5.26.2. There are no known workarounds.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "CentOS-8:alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64",
          "CentOS-8:alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64",
          "CentOS-8:alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch",
          "CentOS-8:alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els-alt-nodejs/cve/CVE-2023-45143"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76",
          "url": "https://github.com/nodejs/undici/commit/e041de359221ebeae04c469e8aff4145764e6d76"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/releases/tag/v5.26.2",
          "url": "https://github.com/nodejs/undici/releases/tag/v5.26.2"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp",
          "url": "https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp"
        },
        {
          "category": "external",
          "summary": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g",
          "url": "https://github.com/nodejs/undici/security/advisories/GHSA-wqq4-5wpv-mx2g"
        },
        {
          "category": "external",
          "summary": "https://hackerone.com/reports/2166948",
          "url": "https://hackerone.com/reports/2166948"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3N4NJ7FR4X4FPZUGNTQAPSTVB2HB2Y4A/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E72T67UPDRXHIDLO3OROR25YAMN4GGW5/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FNA62Q767CFAFHBCDKYNPBMZWB7TWYVU/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HT7T2R4MQKLIF4ODV4BDLPARWFPCJ5CZ/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LKYHSZQFDNR7RSA7LHVLLIAQMVYCUGBG/"
        },
        {
          "category": "external",
          "summary": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/",
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X6QXN4ORIVF6XBW4WWFE7VNPVC74S45Y/"
        }
      ],
      "release_date": "2023-10-12T17:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-12-24T22:16:08.478317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614566",
          "product_ids": [
            "CentOS-8:alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64",
            "CentOS-8:alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64",
            "CentOS-8:alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch",
            "CentOS-8:alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els-alt-nodejs/releases/CLSA-2025:1766614566"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-8:alt-nodejs16-nodejs-0:16.20.2-8.el8.x86_64",
            "CentOS-8:alt-nodejs16-nodejs-devel-0:16.20.2-8.el8.x86_64",
            "CentOS-8:alt-nodejs16-nodejs-docs-0:16.20.2-8.el8.noarch",
            "CentOS-8:alt-nodejs16-npm-0:8.19.4-16.20.2.8.el8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    }
  ]
}