Lucene search

K
githubGitHub Advisory DatabaseGHSA-JF5R-8HM2-F872
HistoryFeb 22, 2022 - 12:00 a.m.

url-parse incorrectly parses hostname / protocol due to unstripped leading control characters.

2022-02-2200:00:30
CWE-639
GitHub Advisory Database
github.com
14

0.003 Low

EPSS

Percentile

69.7%

Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.

If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect.

This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example:

const parse = require('url-parse')
const express = require('express')
const app = express()
const port = 3000

url = parse(\"\\bjavascript:alert(1)\")

console.log(url)

app.get('/', (req, res) => {
 if (url.protocol !== \"javascript:\") {res.send(\"<a href>CLICK ME!</a>\")}
 })

app.listen(port, () =&gt; {
 console.log(`Example app listening on port ${port}`)
 })
CPENameOperatorVersion
url-parselt1.5.9