CVE-2020-26291Improper Input Validation in Uri.js

Severity
6.5MEDIUMNVD
EPSS
0.6%
top 31.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 31

Description

URI.js is a javascript URL mutation library (npm package urijs). In URI.js before version 1.19.4, the hostname can be spoofed by using a backslash (`\`) character followed by an at (`@`) character. If the hostname is used in security decisions, the decision may be incorrect. Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. For example the URL `https://expected-example.com\@observed-example.co

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages2 packages

CVEListV5medialize/uri.js< 1.19.4
NVDuri.js_project/uri.js< 1.19.4

Patches

🔴Vulnerability Details

2
OSV
Hostname spoofing via backslashes in URL2020-12-30
GHSA
Hostname spoofing via backslashes in URL2020-12-30

📋Vendor Advisories

1
Red Hat
urijs: Hostname spoofing via backslashes in URL2020-12-31