Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-0691

Опубликовано: 21 фев. 2022
Источник: redhat
CVSS3: 9.8
EPSS Низкий

Описание

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.

An authorization bypass flaw was found in url-parse. This flaw allows a local unauthenticated attacker to add a backspace character (\b) while submitting a URL. This vulnerability can enable bypassing any hostname checks.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Service Mesh 2.0servicemesh-grafanaAffected
OpenShift Service Mesh 2.0servicemesh-prometheusAffected
OpenShift Service Mesh 2.1servicemesh-grafanaAffected
OpenShift Service Mesh 2.1servicemesh-prometheusAffected
Red Hat Advanced Cluster Management for Kubernetes 2url-parseUnder investigation
Red Hat Quay 3quay/quay-rhel8Affected
Red Hat Virtualization 4url-parseNot affected
Red Hat Migration Toolkit for Containers 1.7rhmtc/openshift-migration-ui-rhel8FixedRHSA-2022:642913.09.2022

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-639
https://bugzilla.redhat.com/show_bug.cgi?id=2060020npm-url-parse: authorization bypass through user-controlled key

EPSS

Процентиль: 30%
0.00109
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.

CVSS3: 9.8
nvd
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.

CVSS3: 9.8
debian
почти 4 года назад

Authorization Bypass Through User-Controlled Key in NPM url-parse prio ...

CVSS3: 6.5
github
почти 4 года назад

url-parse incorrectly parses hostname / protocol due to unstripped leading control characters.

EPSS

Процентиль: 30%
0.00109
Низкий

9.8 Critical

CVSS3