Описание
validator.js has a URL validation bypass vulnerability in its isURL function
A URL validation bypass vulnerability exists in validator.js prior to version 13.15.20. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2025-56200
- https://github.com/validatorjs/validator.js/issues/2600
- https://github.com/validatorjs/validator.js/pull/2608
- https://github.com/validatorjs/validator.js/commit/cbef5088f02d36caf978f378bb845fe49bdc0809
- https://gist.github.com/junan-98/27ae092aa40e2a057d41a0f95148f666
- https://gist.github.com/junan-98/a93130505b258b9e4ec9f393e7533596
- https://github.com/validatorjs/validator.js/releases/tag/13.15.20
- http://validatorjs.com
Пакеты
validator
< 13.15.20
13.15.20
Связанные уязвимости
A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
A URL validation bypass vulnerability exists in validator.js through version 13.15.15. The isURL() function uses '://' as a delimiter to parse protocols, while browsers use ':' as the delimiter. This parsing difference allows attackers to bypass protocol and domain validation by crafting URLs leading to XSS and Open Redirect attacks.
A URL validation bypass vulnerability exists in validator.js through v ...