Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jf5r-8hm2-f872

Опубликовано: 22 фев. 2022
Источник: github
Github: Прошло ревью
CVSS3: 6.5

Описание

url-parse incorrectly parses hostname / protocol due to unstripped leading control characters.

Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.

If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect.

This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example:

const parse = require('url-parse') const express = require('express') const app = express() const port = 3000 url = parse(\"\\bjavascript:alert(1)\") console.log(url) app.get('/', (req, res) => { if (url.protocol !== \"javascript:\") {res.send(\"<a href=\\'\" + url.href + \"\\'>CLICK ME!</a>\")} }) app.listen(port, () => { console.log(`Example app listening on port ${port}`) })

Пакеты

Наименование

url-parse

npm
Затронутые версииВерсия исправления

>= 0.1.0, < 1.5.9

1.5.9

EPSS

Процентиль: 30%
0.00109
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-639

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.

CVSS3: 9.8
redhat
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.

CVSS3: 9.8
nvd
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.

CVSS3: 9.8
debian
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...

EPSS

Процентиль: 30%
0.00109
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-639