First published: Thu Mar 03 2022(Updated: )
An improper input validation flaw was found in urijs where white space characters are not removed from the beginning of an URL. This issue allows bypassing the protocol validation.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Uri.js Project Uri.js | <1.19.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24723 is an improper input validation flaw in urijs where white space characters are not removed from the beginning of the protocol, causing URLs to not be parsed properly.
The severity of CVE-2022-24723 is medium with a severity value of 5.3.
CVE-2022-24723 impacts urijs by allowing white space characters at the beginning of the protocol, which leads to incorrect URL parsing.
CVE-2022-24723 can be fixed by upgrading to version 1.19.9 of urijs, which has a patch for the issue.
The references for CVE-2022-24723 are: [1] GitHub Advisory - GHSA-gmv4-r438-p67f, [2] Huntr.dev Bounty - 82ef23b8-7025-49c9-b5fc-1bb9885788e5, [3] GitHub Commit - 86d10523a6f6e8dc4300d99d671335ee362ad316.