Bug 1934474 (CVE-2021-27515) - CVE-2021-27515 nodejs-url-parse: mishandling certain uses of backslash may lead to confidentiality compromise
Summary: CVE-2021-27515 nodejs-url-parse: mishandling certain uses of backslash may le...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2021-27515
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1935306 1935307 1935308 1935309 1935310 1935311 1935312 1935313 1935314
Blocks: 1934475
TreeView+ depends on / blocked
 
Reported: 2021-03-03 10:30 UTC by Marian Rehak
Modified: 2023-08-31 09:10 UTC (History)
37 users (show)

Fixed In Version: url-parse-1.5.0
Doc Type: If docs needed, set a value
Doc Text:
An input validation flaw exists in the node.js-url-parse, which results in the URL being incorrectly set to the document location protocol instead of the URL being passed as an argument. This flaw allows an attacker to bypass security checks on URLs. The highest threat from this vulnerability is to integrity. This is an incomplete fix for CVE-2020-8124.
Clone Of:
Environment:
Last Closed: 2021-10-19 14:08:41 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2021:3917 0 None None None 2021-10-19 12:10:52 UTC

Description Marian Rehak 2021-03-03 10:30:42 UTC
url-parse before 1.5.0 mishandles certain uses of backslash such as http:\/ and interprets the URI as a relative path.

Reference:

https://github.com/unshiftio/url-parse/commit/d1e7e8822f26e8a49794b757123b51386325b2b0
https://github.com/unshiftio/url-parse/compare/1.4.7...1.5.0
https://github.com/unshiftio/url-parse/pull/197

Comment 9 errata-xmlrpc 2021-10-19 12:10:50 UTC
This issue has been addressed in the following products:

  Red Hat Quay 3

Via RHSA-2021:3917 https://access.redhat.com/errata/RHSA-2021:3917

Comment 10 Product Security DevOps Team 2021-10-19 14:08:41 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2021-27515


Note You need to log in before you can comment on or make changes to this bug.