First published: Fri Jan 07 2022(Updated: )
An authorization bypass vulnerability was found in nodes-url-parse. This flaw allows a remote attacker with a basic user account to evade hostname verification by inserting the at symbol "@" at the end of the password field. This issue can allow entry to systems designed to block remote access and may not have additional defenses.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Url-parse Project Url-parse | <1.5.6 | |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0512 is an authorization bypass vulnerability found in nodes-url-parse.
CVE-2022-0512 allows a remote attacker with a basic user account to bypass hostname verification by inserting the at symbol "@" at the end of the password field.
CVE-2022-0512 has a severity value of 8.8, which is classified as high.
To fix CVE-2022-0512, users should update url-parse to version 1.5.6 or higher.
You can find more information about CVE-2022-0512 in the references provided: [link1], [link2], [link3].