Skip to content

Commit ce2ef76

Browse files
Merge pull request #1283 from AikidoSec/new-in-better-ccflare
new vulnerability in better-ccflare
2 parents 7c1c695 + ce62564 commit ce2ef76

File tree

1 file changed

+27
-0
lines changed

1 file changed

+27
-0
lines changed
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
{
2+
"package_name": "better-ccflare",
3+
"patch_versions": [
4+
"3.0.4"
5+
],
6+
"vulnerable_ranges": [
7+
[
8+
"3.0.0",
9+
"3.0.3"
10+
]
11+
],
12+
"cwe": [
13+
"CWE-200"
14+
],
15+
"tldr": "Affected versions of this package may expose sensitive information by unintentionally forwarding the client API key to OAuth providers. When both `Authorization` and `x-api-key` headers are present, only the `Authorization` header is removed, allowing the API key to be leaked to upstream services. This change ensures both headers are stripped before provider-specific credentials are applied, preventing unintended disclosure of authentication data.",
16+
"doest_this_affect_me": "You are affected if you are using a version that falls within the vulnerable range.",
17+
"how_to_fix": "Upgrade the `better-ccflare` library to the patch version.",
18+
"reporter": "",
19+
"vulnerable_to": "Exposure of Sensitive Information",
20+
"related_cve_id": "",
21+
"language": "JS",
22+
"severity_class": "MEDIUM",
23+
"aikido_score": 55,
24+
"changelog": "https://github.com/tombii/better-ccflare/releases/tag/v3.0.4",
25+
"last_modified": "2025-12-30",
26+
"published": "2025-12-30"
27+
}

0 commit comments

Comments
 (0)