The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-45336

CVE-2024-45336: HTTP Client Header Leak Vulnerability

CVE-2024-45336 is an information disclosure flaw in HTTP clients that leaks sensitive headers during redirect chains. Attackers can exploit cross-domain redirects to capture authorization data. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: January 28, 2026

CVE-2024-45336 Overview

CVE-2024-45336 is an information disclosure vulnerability in the Go programming language's HTTP client implementation. The vulnerability occurs when the HTTP client incorrectly handles sensitive headers during redirect chains. While the client properly drops sensitive headers (such as Authorization) after following a cross-domain redirect, it fails to maintain this protection when a subsequent same-domain redirect occurs in the chain.

For example, when a request to a.com/ containing an Authorization header is redirected to b.com/, the header is correctly stripped. However, if b.com/ then redirects to another path on the same domain (e.g., b.com/2), the sensitive headers are incorrectly restored and sent to the untrusted domain. This creates a potential credential leakage scenario where authentication tokens could be exposed to unintended recipients.

Critical Impact

Sensitive authentication headers including Authorization tokens may be leaked to untrusted third-party domains through crafted redirect chains, potentially enabling unauthorized access to protected resources.

Affected Products

  • Go programming language HTTP client (net/http package)
  • Applications built with Go that use the standard HTTP client with automatic redirect following
  • NetApp products (as referenced in NetApp Security Advisory NTAP-20250221-0003)

Discovery Timeline

  • 2025-01-28 - CVE-2024-45336 published to NVD
  • 2025-02-21 - Last updated in NVD database

Technical Details for CVE-2024-45336

Vulnerability Analysis

This vulnerability stems from a logic flaw in the Go HTTP client's redirect handling mechanism. The HTTP client is designed to protect sensitive headers by stripping them when following redirects to a different domain—a security measure intended to prevent credential leakage. However, the implementation contains a flaw in how it tracks and restores headers during complex redirect scenarios.

The issue manifests specifically in multi-hop redirect chains where the client first crosses domain boundaries (correctly dropping sensitive headers) but then encounters a same-domain redirect on the target domain. The client's internal state machine incorrectly interprets this same-domain redirect as a reason to restore the previously stripped sensitive headers, violating the security boundary that was established during the initial cross-domain redirect.

This vulnerability can be exploited by attackers who control or can manipulate redirect responses from web servers. By crafting a specific redirect chain, an attacker could intercept authentication credentials that were intended only for the original trusted domain.

Root Cause

The root cause lies in the HTTP client's header management logic during redirect processing. When processing redirects, the client maintains state about which headers to preserve or strip. The logic correctly identifies cross-domain redirects and strips sensitive headers, but fails to maintain this "stripped" state when processing subsequent same-domain redirects. Instead, it restores the original headers based on the same-domain condition, not accounting for the previous cross-domain hop in the chain.

Attack Vector

An attacker can exploit this vulnerability through a network-based attack requiring user interaction. The attack scenario involves:

  1. An attacker controls or compromises a web server that can issue HTTP redirects
  2. A victim's Go-based application makes an authenticated request to a trusted domain
  3. The trusted domain (or an attacker performing a man-in-the-middle attack) issues a redirect to an attacker-controlled domain
  4. The attacker's domain issues a same-domain redirect (e.g., from attacker.com/1 to attacker.com/2)
  5. The Go HTTP client incorrectly sends the victim's Authorization header to attacker.com/2

The vulnerability requires the victim to initiate a request with sensitive headers to a domain that can be manipulated to produce the malicious redirect chain. This could occur through compromised web applications, open redirectors, or man-in-the-middle attacks.

For technical implementation details, refer to the Go.dev Issue Discussion and Go.dev Bug Issue.

Detection Methods for CVE-2024-45336

Indicators of Compromise

  • Unexpected HTTP requests containing Authorization headers to domains that should not receive authentication credentials
  • Network traffic patterns showing redirect chains crossing domain boundaries followed by same-domain redirects
  • Application logs indicating authentication failures or unauthorized access attempts following redirect-based workflows

Detection Strategies

  • Monitor outbound HTTP traffic for sensitive headers being sent to unexpected domains, particularly following redirect chains
  • Implement network-level inspection to detect multi-hop redirect chains that cross domain boundaries
  • Review application logs for unusual redirect patterns or authentication token usage anomalies
  • Use SentinelOne's behavioral AI to detect unusual network communication patterns from Go-based applications

Monitoring Recommendations

  • Enable detailed HTTP client logging in Go applications to capture redirect behavior and header transmission
  • Implement network segmentation monitoring to detect sensitive credential leakage across trust boundaries
  • Configure alerts for applications making requests to unexpected domains with authentication headers
  • Regularly audit Go dependencies and runtime versions across your infrastructure

How to Mitigate CVE-2024-45336

Immediate Actions Required

  • Update Go installations to patched versions that address this vulnerability
  • Review Go applications that use the standard HTTP client with automatic redirect following
  • Implement custom redirect policies in critical applications to validate redirect chains before following
  • Audit network traffic from Go-based services for potential credential leakage

Patch Information

The Go development team has addressed this vulnerability through code changes tracked in the Go.dev changelist. Organizations should update to the latest patched Go version as soon as available. Additional details about the vulnerability and affected versions can be found in the Go.dev Vulnerability Database entry GO-2025-3420.

NetApp has also released guidance for affected products in their Security Advisory NTAP-20250221-0003.

Workarounds

  • Implement a custom CheckRedirect function in Go HTTP clients to prevent following redirect chains that cross domain boundaries
  • Strip sensitive headers manually before making HTTP requests that may involve redirects to untrusted domains
  • Use proxy-based HTTP clients that provide more granular control over header propagation during redirects
  • Consider implementing token-based authentication that is domain-scoped rather than using headers that persist across redirects
bash
# Configuration example
# Check Go version and update if needed
go version

# Update to latest Go version
# On Linux/macOS using official installer:
# Download latest from https://go.dev/dl/

# Verify vulnerability status using govulncheck
go install golang.org/x/vuln/cmd/govulncheck@latest
govulncheck ./...

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechN/A

  • SeverityMEDIUM

  • CVSS Score6.1

  • EPSS Probability0.08%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityLow
  • AvailabilityNone
  • Technical References
  • Go.dev Issue Discussion

  • Go.dev Bug Issue

  • Google Groups Golang Dev Post

  • Google Groups Golang Dev Discussion

  • Go.dev Vulnerability GO-2025-3420

  • NetApp Security Advisory NTAP-20250221-0003
  • Latest CVEs
  • CVE-2025-9185: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9184: Mozilla Firefox RCE Vulnerability

  • CVE-2025-9180: Mozilla Firefox Auth Bypass Vulnerability

  • CVE-2025-8030: Mozilla Firefox RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English