Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-0639

Опубликовано: 17 фев. 2022
Источник: redhat
CVSS3: 6.2
EPSS Низкий

Описание

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.

An authorization bypass flaw was found in url-parse. This flaw allows a local unauthenticated attacker to add an at symbol (@) while submitting a URL. This issue enables the bypass of validation or block-listing restrictions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.0servicemesh-grafanaAffected
OpenShift Service Mesh 2.0servicemesh-prometheusAffected
OpenShift Service Mesh 2.1servicemesh-grafanaWill not fix
OpenShift Service Mesh 2.1servicemesh-prometheusNot affected
Red Hat Advanced Cluster Management for Kubernetes 2url-parseNot affected
Red Hat Quay 3quay/quay-rhel8Affected
Red Hat Virtualization 4url-parseNot affected
Red Hat Migration Toolkit for Containers 1.7rhmtc/openshift-migration-ui-rhel8FixedRHSA-2022:642913.09.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-639
https://bugzilla.redhat.com/show_bug.cgi?id=2057442npm-url-parse: Authorization Bypass Through User-Controlled Key

EPSS

Процентиль: 6%
0.00025
Низкий

6.2 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.

CVSS3: 5.3
nvd
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.7.

CVSS3: 5.3
debian
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...

CVSS3: 6.5
github
почти 4 года назад

url-parse Incorrectly parses URLs that include an '@'

EPSS

Процентиль: 6%
0.00025
Низкий

6.2 Medium

CVSS3