parse-url@1.2.1 vulnerabilities

An advanced url parser supporting git urls too.

  • latest version

    9.2.0

  • latest non vulnerable version

  • first published

    11 years ago

  • latest version published

    8 months ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the parse-url package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Improper Input Validation

    parse-url is an An advanced url parser supporting git urls too.

    Affected versions of this package are vulnerable to Improper Input Validation due to incorrect parsing of URLs. This allows the attacker to craft a malformed URL which can lead to a phishing attack.

    
    const parseUrl = require("parse-url");
    const Url = require("url");
    
    const express = require('express');
    const app = express();
    
    var url = "https://www.google.com:x@fakesite.com:x";
    parsed = parseUrl(url);
    console.log("[*]`parse-url` output: ")
    console.log(parsed);
    
    parsed2 = Url.parse(url);
    console.log("[*]`url` output: ")
    console.log(parsed2)
    
    app.get('/', (req, res) => {
        if (parsed.host == "www.google.com") {
            res.send("<a href=\'" + parsed2.href + "\'>CLICK ME!</a>")
        }
    })
    
    app.listen(8888,"0.0.0.0");
    

    How to fix Improper Input Validation?

    Upgrade parse-url to version 8.1.0 or higher.

    <8.1.0
    • M
    Server-side Request Forgery (SSRF)

    parse-url is an An advanced url parser supporting git urls too.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to improper detection of protocol, resource, and pathname fields. Exploiting this vulnerability results in bypassing protocol verification.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade parse-url to version 8.1.0 or higher.

    <8.1.0
    • M
    Cross-site Scripting (XSS)

    parse-url is an An advanced url parser supporting git urls too.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitization of special ASCII characters that start with \r\r or \r. This vulnerability exists due to an incomplete fix for CVE-2022-2217.

    How to fix Cross-site Scripting (XSS)?

    Upgrade parse-url to version 6.0.1 or higher.

    <6.0.1
    • C
    Server-side Request Forgery (SSRF)

    parse-url is an An advanced url parser supporting git urls too.

    Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) in the parseUrl function, due to mishandling hostnames when processing usernames and passwords.

    How to fix Server-side Request Forgery (SSRF)?

    Upgrade parse-url to version 6.0.1 or higher.

    <6.0.1
    • M
    Cross-site Scripting (XSS)

    parse-url is an An advanced url parser supporting git urls too.

    Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to improper sanitization of special characters for ASCII that start with \x and also for all Unicodes start with \u.

    How to fix Cross-site Scripting (XSS)?

    Upgrade parse-url to version 6.0.1 or higher.

    <6.0.1
    • M
    Information Exposure

    parse-url is an An advanced url parser supporting git urls too.

    Affected versions of this package are vulnerable to Information Exposure due to improper validation.

    How to fix Information Exposure?

    Upgrade parse-url to version 6.0.1 or higher.

    <6.0.1