First published: Wed Nov 28 2018(Updated: )
A flaw was found in Node.js versions before 6.15.0, 8.14.0, 10.14.0 and 11.3.0. A hostname spoofing in URL parser for javascript protocol. If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case "javascript:" (e.g. "javAscript:") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect. References: <a href="https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/">https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/</a>
Credit: cve-request@iojs.org cve-request@iojs.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/nodejs | <6.15.0 | 6.15.0 |
redhat/nodejs | <8.14.0 | 8.14.0 |
redhat/nodejs | <10.14.0 | 10.14.0 |
redhat/nodejs | <11.3.0 | 11.3.0 |
F5 BIG-IP | >=17.1.0<=17.1.2 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 BIG-IP | >=14.1.0<=14.1.5 | |
F5 BIG-IP | >=13.1.0<=13.1.5 | |
F5 BIG-IQ Centralized Management | >=8.0.0<=8.3.0 | |
Node.js | >=6.0.0<6.15.0 | |
Node.js | >=8.0.0<8.14.0 | |
Node.js | >=10.0.0<10.14.0 | |
Node.js | >=11.0.0<11.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.