First published: Wed Dec 30 2020(Updated: )
A flaw was found in urijs. The hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Uri.js Project Uri.js | <1.19.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this flaw in urijs is CVE-2020-26291.
The severity of CVE-2020-26291 is medium with a CVSS score of 6.5.
The vulnerability in urijs allows hostname spoofing by using a backslash (`\`) character followed by an at (`@`) character.
The affected software version of urijs is version 1.19.4 and prior.
To fix the vulnerability in urijs, update to version 1.19.4.