Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-0686

Опубликовано: 20 фев. 2022
Источник: redhat
CVSS3: 9.1

Описание

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.

An authorization bypass flaw was found in url-parse. While submitting a URL, a local unauthenticated attacker can add a trailing colon (:), but omit the port number. This issue enables an open redirect that allows the exposure of sensitive information or spamming of infrastructure outside the vulnerable server.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.0servicemesh-grafanaAffected
OpenShift Service Mesh 2.0servicemesh-prometheusAffected
OpenShift Service Mesh 2.1openshift-service-mesh/kiali-rhel8Will not fix
OpenShift Service Mesh 2.1servicemesh-grafanaWill not fix
OpenShift Service Mesh 2.1servicemesh-prometheusNot affected
Red Hat Advanced Cluster Management for Kubernetes 2url-parseUnder investigation
Red Hat Quay 3quay/quay-rhel8Affected
Red Hat Virtualization 4url-parseNot affected
Red Hat Migration Toolkit for Containers 1.7rhmtc/openshift-migration-ui-rhel8FixedRHSA-2022:642913.09.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-639
https://bugzilla.redhat.com/show_bug.cgi?id=2060018npm-url-parse: Authorization bypass through user-controlled key

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.

CVSS3: 9.1
nvd
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.

CVSS3: 9.1
debian
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...

CVSS3: 9.1
github
почти 4 года назад

Authorization Bypass Through User-Controlled Key in url-parse

9.1 Critical

CVSS3