Skip to main content

Improper Input Validation in org.webjars.npm:parse-url

Cx215c2573-d9b3

  • org.webjars.npm:parse-url
  • parse-url
Severity Medium
Score 6.5/10

Summary

parse-url mishandles certain uses of backslash such as "https:/\" and interprets the URI as a relative path. Browsers accept backslashes after the protocol, and treat it as a normal slash, while parse-url sees it as a relative path. Which will lead to SSRF attacks, open redirects, or other undesired behavior. This issue affects versions through 6.0.0, and versions 6.0.2, 6.0.3 and 6.0.5. Similar to CVE-2021-27515, CVE-2021-27516.

  • LOW
  • NETWORK
  • LOW
  • UNCHANGED
  • NONE
  • NONE
  • LOW
  • NONE

CWE-20 - Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

Advisory Timeline

  • Published