Improper Input Validation in org.webjars.npm:parse-url
Cx215c2573-d9b3
- org.webjars.npm:parse-url
- parse-url
Summary
parse-url mishandles certain uses of backslash such as "https:/\" and interprets the URI as a relative path. Browsers accept backslashes after the protocol, and treat it as a normal slash, while parse-url sees it as a relative path. Which will lead to SSRF attacks, open redirects, or other undesired behavior. This issue affects versions through 6.0.0, and versions 6.0.2, 6.0.3 and 6.0.5. Similar to CVE-2021-27515, CVE-2021-27516.
- LOW
- NETWORK
- LOW
- UNCHANGED
- NONE
- NONE
- LOW
- NONE
CWE-20 - Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
References
Advisory Timeline
- Published