Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXA2ajktN3hoYy1yaHdw
URIjs Hostname spoofing via backslashes in URL
Impact
If using affected versions to determine a URL's hostname, the hostname can be spoofed by using a backslash (\
) character as part of the scheme delimiter, e.g. scheme:/\hostname
. If the hostname is used in security decisions, the decision may be incorrect.
Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
Example URL: https:/\expected-example.com/path
Escaped string: https:/\\expected-example.com/path
(JavaScript strings must escape backslash)
Affected versions incorrectly return no hostname. Patched versions correctly return expected-example.com
. Patched versions match the behavior of other parsers which implement the WHATWG URL specification, including web browsers and Node's built-in URL class.
Patches
Version 1.19.6 is patched against all known payload variants.
References
https://github.com/medialize/URI.js/releases/tag/v1.19.6 (fix for this particular bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.4 (fix for related bypass)
https://github.com/medialize/URI.js/releases/tag/v1.19.3 (fix for related bypass)
PR #233 (initial fix for backslash handling)
For more information
If you have any questions or comments about this advisory, open an issue in https://github.com/medialize/URI.js
Reporter credit
Yaniv Nizry from the CxSCA AppSec team at Checkmarx
Permalink: https://github.com/advisories/GHSA-p6j9-7xhc-rhwpJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXA2ajktN3hoYy1yaHdw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 3 years ago
Updated: 5 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Identifiers: GHSA-p6j9-7xhc-rhwp, CVE-2021-27516
References:
- https://github.com/medialize/URI.js/security/advisories/GHSA-p6j9-7xhc-rhwp
- https://nvd.nist.gov/vuln/detail/CVE-2021-27516
- https://github.com/medialize/URI.js/commit/a1ad8bcbc39a4d136d7e252e76e957f3ece70839
- https://github.com/medialize/URI.js/releases/tag/v1.19.6
- https://advisory.checkmarx.net/advisory/CX-2021-4305
- https://github.com/advisories/GHSA-p6j9-7xhc-rhwp
Blast Radius: 39.5
Affected Packages
npm:urijs
Dependent packages: 1,163Dependent repositories: 187,610
Downloads: 7,906,985 last month
Affected Version Ranges: < 1.19.6
Fixed in: 1.19.6
All affected versions: 1.16.1, 1.17.0, 1.17.1, 1.18.0, 1.18.1, 1.18.2, 1.18.3, 1.18.4, 1.18.5, 1.18.6, 1.18.7, 1.18.8, 1.18.9, 1.18.10, 1.18.11, 1.18.12, 1.19.0, 1.19.1, 1.19.2, 1.19.3, 1.19.4, 1.19.5
All unaffected versions: 1.19.6, 1.19.7, 1.19.8, 1.19.9, 1.19.10, 1.19.11