Description
The package url-js before 2.1.0 are vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1531 | The package url-js before 2.1.0 are vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is. |
Github GHSA |
GHSA-rf54-44jr-q5vf | Improper Input Validation in url-js |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T22:35:35.422Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-25839
No data.
Status : Modified
Published: 2022-03-11T20:15:09.100
Modified: 2024-11-21T06:53:05.873
Link: CVE-2022-25839
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA