Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-0722

Опубликовано: 27 июн. 2022
Источник: redhat
CVSS3: 7.5

Описание

Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ionicabizau/parse-url prior to 7.0.0.

A flaw was found in the parse-url package. Affected versions of this package are vulnerable to information exposure due to an improper validation issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Apicurio Registry 2parse-urlAffected
Red Hat Integration Camel K 1parse-urlWill not fix
Red Hat Integration Data Virtualisation Operatorparse-urlOut of support scope
Red Hat Integration Service Registryparse-urlOut of support scope
Red Hat OpenShift Container Platform 4openshift4/ose-consoleNot affected
Red Hat OpenShift Dev Spacesdevspaces/dashboard-rhel8Not affected
Red Hat OpenShift distributed tracing 2rhosdt/jaeger-agent-rhel8Will not fix
Red Hat OpenShift distributed tracing 2rhosdt/jaeger-all-in-one-rhel8Not affected
Red Hat OpenShift distributed tracing 2rhosdt/jaeger-collector-rhel8Will not fix
Red Hat OpenShift distributed tracing 2rhosdt/jaeger-es-index-cleaner-rhel8Will not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-212
https://bugzilla.redhat.com/show_bug.cgi?id=2103584parse-url: Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ionicabizau/parse-url

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 3 лет назад

Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository ionicabizau/parse-url prior to 7.0.0.

CVSS3: 7.5
github
больше 3 лет назад

Hostname confusion in parse-url

7.5 High

CVSS3