All the vulnerabilites related to medialize - URI.js
cve-2022-24723
Vulnerability from cvelistv5
Published
2022-03-03 20:35
Modified
2024-08-03 04:20
Severity ?
EPSS score ?
Summary
Improper Input Validation in URI.js
References
▼ | URL | Tags |
---|---|---|
https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f | x_refsource_CONFIRM | |
https://github.com/medialize/uri.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316 | x_refsource_MISC | |
https://github.com/medialize/URI.js/releases/tag/v1.19.9 | x_refsource_MISC | |
https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T04:20:50.182Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/medialize/uri.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/medialize/URI.js/releases/tag/v1.19.9" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "URI.js", "vendor": "medialize", "versions": [ { "status": "affected", "version": "\u003c 1.19.9" } ] } ], "descriptions": [ { "lang": "en", "value": "URI.js is a Javascript URL mutation library. Before version 1.19.9, whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly. This issue has been patched in version 1.19.9. Removing leading whitespace from values before passing them to URI.parse can be used as a workaround." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20: Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-03T20:35:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/medialize/uri.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/medialize/URI.js/releases/tag/v1.19.9" }, { "tags": [ "x_refsource_MISC" ], "url": "https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/" } ], "source": { "advisory": "GHSA-gmv4-r438-p67f", "discovery": "UNKNOWN" }, "title": "Improper Input Validation in URI.js", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24723", "STATE": "PUBLIC", "TITLE": "Improper Input Validation in URI.js" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "URI.js", "version": { "version_data": [ { "version_value": "\u003c 1.19.9" } ] } } ] }, "vendor_name": "medialize" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "URI.js is a Javascript URL mutation library. Before version 1.19.9, whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly. This issue has been patched in version 1.19.9. Removing leading whitespace from values before passing them to URI.parse can be used as a workaround." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20: Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f", "refsource": "CONFIRM", "url": "https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f" }, { "name": "https://github.com/medialize/uri.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316", "refsource": "MISC", "url": "https://github.com/medialize/uri.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316" }, { "name": "https://github.com/medialize/URI.js/releases/tag/v1.19.9", "refsource": "MISC", "url": "https://github.com/medialize/URI.js/releases/tag/v1.19.9" }, { "name": "https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/", "refsource": "MISC", "url": "https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/" } ] }, "source": { "advisory": "GHSA-gmv4-r438-p67f", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24723", "datePublished": "2022-03-03T20:35:11", "dateReserved": "2022-02-10T00:00:00", "dateUpdated": "2024-08-03T04:20:50.182Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-26291
Vulnerability from cvelistv5
Published
2020-12-30 23:40
Modified
2024-08-04 15:56
Severity ?
EPSS score ?
Summary
Hostname spoofing in URI.js
References
▼ | URL | Tags |
---|---|---|
https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg | x_refsource_CONFIRM | |
https://www.npmjs.com/package/urijs | x_refsource_MISC | |
https://github.com/medialize/URI.js/releases/tag/v1.19.4 | x_refsource_MISC | |
https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:56:03.814Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.npmjs.com/package/urijs" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/medialize/URI.js/releases/tag/v1.19.4" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "URI.js", "vendor": "medialize", "versions": [ { "status": "affected", "version": "\u003c 1.19.4" } ] } ], "descriptions": [ { "lang": "en", "value": "URI.js is a javascript URL mutation library (npm package urijs). In URI.js before version 1.19.4, the hostname can be spoofed by using a backslash (`\\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. For example the URL `https://expected-example.com\\@observed-example.com` will incorrectly return `observed-example.com` if using an affected version. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the WHATWG URL specification, including web browsers and Node\u0027s built-in URL class. Version 1.19.4 is patched against all known payload variants. Version 1.19.3 has a partial patch but is still vulnerable to a payload variant.]" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-30T23:40:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.npmjs.com/package/urijs" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/medialize/URI.js/releases/tag/v1.19.4" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155" } ], "source": { "advisory": "GHSA-3329-pjwv-fjpg", "discovery": "UNKNOWN" }, "title": "Hostname spoofing in URI.js", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2020-26291", "STATE": "PUBLIC", "TITLE": "Hostname spoofing in URI.js" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "URI.js", "version": { "version_data": [ { "version_value": "\u003c 1.19.4" } ] } } ] }, "vendor_name": "medialize" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "URI.js is a javascript URL mutation library (npm package urijs). In URI.js before version 1.19.4, the hostname can be spoofed by using a backslash (`\\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. For example the URL `https://expected-example.com\\@observed-example.com` will incorrectly return `observed-example.com` if using an affected version. Patched versions correctly return `expected-example.com`. Patched versions match the behavior of other parsers which implement the WHATWG URL specification, including web browsers and Node\u0027s built-in URL class. Version 1.19.4 is patched against all known payload variants. Version 1.19.3 has a partial patch but is still vulnerable to a payload variant.]" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg", "refsource": "CONFIRM", "url": "https://github.com/medialize/URI.js/security/advisories/GHSA-3329-pjwv-fjpg" }, { "name": "https://www.npmjs.com/package/urijs", "refsource": "MISC", "url": "https://www.npmjs.com/package/urijs" }, { "name": "https://github.com/medialize/URI.js/releases/tag/v1.19.4", "refsource": "MISC", "url": "https://github.com/medialize/URI.js/releases/tag/v1.19.4" }, { "name": "https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155", "refsource": "MISC", "url": "https://github.com/medialize/URI.js/commit/b02bf037c99ac9316b77ff8bfd840e90becf1155" } ] }, "source": { "advisory": "GHSA-3329-pjwv-fjpg", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2020-26291", "datePublished": "2020-12-30T23:40:16", "dateReserved": "2020-10-01T00:00:00", "dateUpdated": "2024-08-04T15:56:03.814Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }