Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
References
Link | Resource |
---|---|
https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40 | Patch Third Party Advisory |
https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b | Exploit Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html | |
https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40 | Patch Third Party Advisory |
https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b | Exploit Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html |
Configurations
History
21 Nov 2024, 06:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40 - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/6d1bc51f-1876-4f5b-a2c2-734e09e8e05b - Exploit, Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html - |
Information
Published : 2022-02-14 16:15
Updated : 2024-11-21 06:38
NVD link : CVE-2022-0512
Mitre link : CVE-2022-0512
CVE.ORG link : CVE-2022-0512
JSON object : View
Products Affected
url-parse_project
- url-parse
CWE
CWE-639
Authorization Bypass Through User-Controlled Key