Open Redirect Affecting urijs package, versions <1.19.7
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.08% (34th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JS-URIJS-1319803
- published 16 Jul 2021
- disclosed 16 Jul 2021
- credit ready-research
Introduced: 16 Jul 2021
CVE-2021-3647 Open this link in a new tabHow to fix?
Upgrade urijs
to version 1.19.7 or higher.
Overview
urijs is a Javascript library for working with URLs.
Affected versions of this package are vulnerable to Open Redirect. It mishandles certain uses of backslash such as https:/\
and interprets the URI as a relative path. Browsers usually accept backslashes after the protocol, and treat it as a normal slash.
PoC
var URI = require('urijs');
var url = new URI("https:/\/\/\www.google.com");
console.log(url); // Which will return --> path: "/www.google.com"
References
CVSS Scores
version 3.1