Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nY3Y4LWdoNHItMjV4Ns0szg
Authorization Bypass Through User-Controlled Key in urijs
Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647.
Permalink: https://github.com/advisories/GHSA-gcv8-gh4r-25x6JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nY3Y4LWdoNHItMjV4Ns0szg
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 2 years ago
Updated: about 1 year ago
CVSS Score: 6.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Identifiers: GHSA-gcv8-gh4r-25x6, CVE-2022-0613
References:
- https://nvd.nist.gov/vuln/detail/CVE-2022-0613
- https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f
- https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083
- https://lists.fedoraproject.org/archives/list/[email protected]/message/MXSSATHALUSXXD2KT6UFZAX7EG4GR332/
- https://github.com/advisories/GHSA-gcv8-gh4r-25x6
Blast Radius: 34.3
Affected Packages
npm:urijs
Dependent packages: 1,163Dependent repositories: 187,610
Downloads: 8,519,365 last month
Affected Version Ranges: < 1.19.8
Fixed in: 1.19.8
All affected versions: 1.16.1, 1.17.0, 1.17.1, 1.18.0, 1.18.1, 1.18.2, 1.18.3, 1.18.4, 1.18.5, 1.18.6, 1.18.7, 1.18.8, 1.18.9, 1.18.10, 1.18.11, 1.18.12, 1.19.0, 1.19.1, 1.19.2, 1.19.3, 1.19.4, 1.19.5, 1.19.6, 1.19.7
All unaffected versions: 1.19.8, 1.19.9, 1.19.10, 1.19.11