First published: Mon Feb 21 2022(Updated: )
An authorization bypass flaw was found in url-parse. This flaw allows a local unauthenticated attacker to add a backspace character (\b) while submitting a URL. This vulnerability can enable bypassing any hostname checks.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
npm/url-parse | <1.5.9 | 1.5.9 |
Url-parse Project Url-parse | <1.5.9 | |
redhat/url-parse | <1.5.9 | 1.5.9 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0691 is a vulnerability that allows authorization bypass through user-controlled key in NPM url-parse prior to version 1.5.9.
CVE-2022-0691 has a severity rating of critical with a CVSS score of 9.8.
The npm package 'url-parse' versions prior to 1.5.9, as well as the Red Hat package 'url-parse' versions prior to 1.5.9, and the Url-parse Project Url-parse with versions up to 1.5.9.
An attacker can bypass authorization by manipulating the URL and causing it to be interpreted as a relative URL without a hostname and protocol.
Update the affected 'url-parse' packages to version 1.5.9 or higher.