First published: Wed Feb 16 2022(Updated: )
A flaw was found in urijs due to the fix of CVE-2021-3647 not considering case-sensitive protocol schemes in the URL. This issue allows attackers to bypass the patch.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/urijs | <1.19.8 | 1.19.8 |
redhat/rh-dotnet31-dotnet | <0:3.1.418-1.el7_9 | 0:3.1.418-1.el7_9 |
redhat/dotnet3.1 | <0:3.1.418-1.el8_5 | 0:3.1.418-1.el8_5 |
Uri.js Project Uri.js | <1.19.8 | |
Fedoraproject Fedora | =35 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-0613 is a vulnerability that allows attackers to bypass the patch in urijs prior to version 1.19.8.
CVE-2022-0613 has a severity keyword of medium and a severity value of 6.5.
To fix CVE-2022-0613, update to version 1.19.8 or higher of urijs.
You can find more information about CVE-2022-0613 at the following references: <ul><li><a href='https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083'>https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083</a></li><li><a href='https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'>https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f</a></li><li><a href='https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2055545'>https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2055545</a></li></ul>
The affected software for CVE-2022-0613 includes urijs prior to version 1.19.8, rh-dotnet31-dotnet version up to exclusive 0:3.1.418-1.el7_9, and dotnet3.1 version up to exclusive 0:3.1.418-1.el8_5.