CVE-2022-0691

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.
Configurations

Configuration 1 (hide)

cpe:2.3:a:url-parse_project:url-parse:*:*:*:*:*:node.js:*:*

History

23 Feb 2023, 03:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html -

18 Apr 2022, 19:35

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220325-0006/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220325-0006/ - Third Party Advisory

25 Mar 2022, 08:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220325-0006/ -

28 Feb 2022, 19:28

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CPE cpe:2.3:a:url-parse_project:url-parse:*:*:*:*:*:node.js:*:*
References (MISC) https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63 - (MISC) https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63 - Patch, Third Party Advisory
References (CONFIRM) https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4 - (CONFIRM) https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4 - Exploit, Patch, Third Party Advisory

21 Feb 2022, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-21 09:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-0691

Mitre link : CVE-2022-0691

CVE.ORG link : CVE-2022-0691


JSON object : View

Products Affected

url-parse_project

  • url-parse
CWE
CWE-639

Authorization Bypass Through User-Controlled Key