Bug 1800774 (CVE-2020-8124)
Summary: | CVE-2020-8124 npmjs-url-parse: Improper validation of protocol of the returned URL | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Pedro Sampaio <psampaio> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | abonas, bdettelb, jschorr, kconner, mcooper, rcernich, tomckay |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | nodejs-url-parse 1.4.5 | Doc Type: | If docs needed, set a value |
Doc Text: |
An input validation flaw exists in the node.js-url-parse, which results in the URL being incorrectly set to the document location protocol instead of the URL being passed as an argument. An attacker could use this flaw to bypass security checks on URLs.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-03-25 22:31:51 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1802346 | ||
Bug Blocks: | 1800776 |
Description
Pedro Sampaio
2020-02-07 20:55:26 UTC
Upstream commit: https://github.com/unshiftio/url-parse/commit/3ecd256f127c3ada36a84d9b8dd3ebd14316274b Created nodejs-url-parse-lax tracking bugs for this issue: Affects: epel-7 [bug 1802346] OpenShift ServiceMesh is packaging a vulnerable version of nodejs url-parse (1.4.4) in the container: - distributed-tracing/jaeger-rhel7-operator Also found in the kiali rpm. The grafana component included within ServiceMesh itself, also includes url-parse but is version 1.4.7 and is not vulnerable. This issue has been addressed in the following products: Openshift Service Mesh 1.0 Via RHSA-2020:0972 https://access.redhat.com/errata/RHSA-2020:0972 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-8124 |