Lucene search

K
nodejsAnonymousNODEJS:1640
HistoryMar 01, 2021 - 8:43 p.m.

Hostname spoofing via backslashes in URL

2021-03-0120:43:24
Anonymous
www.npmjs.com
31
hostname spoofing
urijs
version 1.19.6
spoofing
security decisions
escaped string
github advisory
cve
previous issue

EPSS

0.003

Percentile

68.3%

Overview

Impact

urijs before version 1.19.6 is affected by hostname spoofing issue.

If using urijs to determine a URL’s hostname, the hostname can be spoofed by using a backslash (\) character as part of the scheme delimiter, e.g. scheme:/\hostname. If the hostname is used in security decisions, the decision may be incorrect.

Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.

Example URL: https:/\expected-example.com/path
Escaped string: https:/\\expected-example.com/path (JavaScript strings must escape backslash)

Affected versions incorrectly return no hostname. Patched versions correctly return expected-example.com. Patched versions match the behavior of other parsers which implement the WHATWG URL specification, including web browsers and Node’s built-in URL class.

Recommendation

Upgrade to version 1.19.6

References

EPSS

0.003

Percentile

68.3%