This affects all versions of package react-native-fast-image. When an image with source={{uri: "...", headers: { host: "somehost.com", authorization: "..." }} is loaded, all other subsequent images will use the same headers, this can lead to signing credentials or other session tokens being leaked to other servers.
References
Link | Resource |
---|---|
https://github.com/DylanVann/react-native-fast-image/issues/690 | Exploit Third Party Advisory |
https://github.com/DylanVann/react-native-fast-image/pull/691 | Exploit Issue Tracking Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-REACTNATIVEFASTIMAGE-572228 | Exploit Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-07-17 10:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-7696
Mitre link : CVE-2020-7696
CVE.ORG link : CVE-2020-7696
JSON object : View
Products Affected
react-native-fast-image_project
- react-native-fast-image
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor