StackPatch is liveSee product

Back to CVE digest
Ubuntu USN · USN-8217-1

follow-redirects vulnerabilities

Published: Tue, 28 Apr 2026 13:57

CVE-2024-28849CVE-2023-26159CVE-2022-0536CVE-2022-0155

Summary

Several security issues were fixed in follow-redirects.

Details

It was discovered that follow-redirects did not properly protect sensitive user information during redirects. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2022-0155) It was discovered that follow-redirects did not properly remove sensitive information before storage or transfer. An attacker could possibly use this issue to expose sensitive information. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2022-0536) It was discovered that follow-redirects did not properly validate URLs when handling certain inputs. An attacker could possibly use this issue to redirect users to a malicious site, resulting in information disclosure or phishing attacks. (CVE-2023-26159) It was discovered that follow-redirects did not properly clear proxy authentication headers during cross-domain redirects. An attacker could possibly use this issue to cause exposure of sensitive credentials. (CVE-2024-28849)

Recommended actions per Ubuntu release

StackPatch playbook auto-generated per release codename and per affected package.

Ubuntu bionic

  • node-follow-redirects1.2.4-1ubuntu0.18.04.1~esm1apt_upgrade_esm

    Fixed at 1.2.4-1ubuntu0.18.04.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y node-follow-redirects=1.2.4-1ubuntu0.18.04.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • node-follow-redirects1.2.4-1ubuntu0.18.04.1~esm1apt_upgrade_esm

    Fixed at 1.2.4-1ubuntu0.18.04.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y node-follow-redirects=1.2.4-1ubuntu0.18.04.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Ubuntu focal

  • node-follow-redirects1.2.4-1ubuntu0.20.04.1~esm1apt_upgrade_esm

    Fixed at 1.2.4-1ubuntu0.20.04.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y node-follow-redirects=1.2.4-1ubuntu0.20.04.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • node-follow-redirects1.2.4-1ubuntu0.20.04.1~esm1apt_upgrade_esm

    Fixed at 1.2.4-1ubuntu0.20.04.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y node-follow-redirects=1.2.4-1ubuntu0.20.04.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Ubuntu jammy

  • node-follow-redirects1.14.9+~1.14.1-1ubuntu0.1~esm1apt_upgrade_esm

    Fixed at 1.14.9+~1.14.1-1ubuntu0.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y node-follow-redirects=1.14.9+~1.14.1-1ubuntu0.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

  • node-follow-redirects1.14.9+~1.14.1-1ubuntu0.1~esm1apt_upgrade_esm

    Fixed at 1.14.9+~1.14.1-1ubuntu0.1~esm1 — ESM-only. Enable Ubuntu Pro (free for 5 personal machines) or treat as watch item.

    sudo pro attach <token>
    sudo apt-get update
    sudo apt-get install --only-upgrade -y node-follow-redirects=1.14.9+~1.14.1-1ubuntu0.1~esm1

    Sign up at https://ubuntu.com/pro. Free for personal + small-team use.

Are YOU affected by USN-8217-1?

5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether USN-8217-1 (and any other live CVE) applies. Anonymous, no signup.

curl https://mindsparkstack.com/scan.sh | bash
Want this automated for your servers?

StackPatch runs this match against YOUR installed packages every hour

Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.