Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix CVE–2018–3774 #2

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

debricked-staging[bot]
Copy link

CVE–2018–3774

Vulnerable dependency:     url-parse (Yarn)    1.0.5    1.1.9

Vulnerability details

Description

URL Redirection to Untrusted Site ('Open Redirect')

A web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks.

GitHub

Open Redirect in url-parse

Versions of url-parse before 1.4.3 returns the wrong hostname which could lead to Open Redirect, Server Side Request Forgery (SSRF), or Bypass Authentication Protocol vulnerabilities.

Recommendation

Update to version 1.4.3 or later.

NVD

Incorrect parsing in url-parse <1.4.3 returns wrong hostname which leads to multiple vulnerabilities such as SSRF, Open Redirect, Bypass Authentication Protocol.

CVSS details - 10

 

CVSS3 metrics
Attack Vector Network
Attack Complexity Low
Privileges Required None
User interaction None
Scope Changed
Confidentiality High
Integrity High
Availability High
References

    NVD - CVE-2018-3774
    Open Redirect in url-parse · CVE-2018-3774 · GitHub Advisory Database · GitHub
    [security] Sanitize paths, hosts before parsing. · unshiftio/url-parse@53b1794 · GitHub
    HackerOne
    [security] Added missing SECURITY.md · unshiftio/url-parse@d7b582e · GitHub

 

Related information

📌 Remember! Check the changes to ensure they don't introduce any breaking changes.
📚 Read more about the CVE

 

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants