Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case "javascript:" (e.g. "javAscript:") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2019:1821 | Third Party Advisory |
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202003-48 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2019:1821 | Third Party Advisory |
https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ | Patch Vendor Advisory |
https://security.gentoo.org/glsa/202003-48 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2019:1821 - Third Party Advisory | |
References | () https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ - Patch, Vendor Advisory | |
References | () https://security.gentoo.org/glsa/202003-48 - Third Party Advisory |
Information
Published : 2018-11-28 17:29
Updated : 2024-11-21 03:44
NVD link : CVE-2018-12123
Mitre link : CVE-2018-12123
CVE.ORG link : CVE-2018-12123
JSON object : View
Products Affected
nodejs
- node.js