First published: Sun Feb 20 2022(Updated: )
An authorization bypass flaw was found in url-parse. While submitting a URL, a local unauthenticated attacker can add a trailing colon (:), but omit the port number. This issue enables an open redirect that allows the exposure of sensitive information or spamming of infrastructure outside the vulnerable server.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
npm/url-parse | <1.5.8 | 1.5.8 |
redhat/url-parse | <1.5.8 | 1.5.8 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data | <=2.2 | |
IBM Watson Query with Cloud Pak for Data | <=2.1 | |
IBM Watson Query with Cloud Pak for Data | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 | |
url-parse | <1.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0686 is an authorization bypass vulnerability in url-parse prior to version 1.5.8.
CVE-2022-0686 has a severity rating of 9.1 (Critical).
An attacker can exploit CVE-2022-0686 by adding a trailing colon (:) without the port number while submitting a URL, which enables an open redirect that can expose sensitive information or spam infrastructure.
The remedy for CVE-2022-0686 is to update url-parse to version 1.5.8 or higher.
You can find more information about CVE-2022-0686 at the following references: [Reference 1](https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78c), [Reference 2](https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5), [Reference 3](https://github.com/RedHatInsights/ocp-advisor-frontend/blob/prod-stable/package-lock.json).