Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): update dependency url-parse to v1.5.9 [security] - abandoned #1667

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Sep 26, 2021

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
url-parse 1.5.1 -> 1.5.9 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2022-0512

Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.

CVE-2022-0639

A specially crafted URL with an '@​' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular,

parse(\"http://@​/127.0.0.1\")

Will return:

{
 slashes: true,
 protocol: 'http:',
 hash: '',
 query: '',
 pathname: '/127.0.0.1',
 auth: '',
 host: '',
 port: '',
 hostname: '',
 password: '',
 username: '',
 origin: 'null',
 href: 'http:///127.0.0.1'
 }

If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect.

CVE-2022-0686

url-parse prior to version 1.5.8 is vulnerable to Authorization Bypass Through User-Controlled Key.

CVE-2022-0691

Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.

If url-parse is used in security decisions involving the hostname / protocol, and the input URL is used in a client which uses the WHATWG URL parser, the decision may be incorrect.

This can also lead to a cross-site scripting (XSS) vulnerability if url-parse is used to check for the javascript: protocol in URLs. See following example:

const parse = require('url-parse')
const express = require('express')
const app = express()
const port = 3000

url = parse(\"\\bjavascript:alert(1)\")

console.log(url)

app.get('/', (req, res) => {
 if (url.protocol !== \"javascript:\") {res.send(\"<a href=\\'\" + url.href + \"\\'>CLICK ME!</a>\")}
 })

app.listen(port, () => {
 console.log(`Example app listening on port ${port}`)
 })

CVE-2021-3664

Overview

Affected versions of npm url-parse are vulnerable to URL Redirection to Untrusted Site.

Impact

Depending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.


Release Notes

unshiftio/url-parse

v1.5.9

Compare Source

v1.5.8

Compare Source

v1.5.7

Compare Source

v1.5.6

Compare Source

v1.5.5

Compare Source

v1.5.4

Compare Source

v1.5.3

Compare Source

v1.5.2

Compare Source


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@github-actions
Copy link

github-actions bot commented Sep 26, 2021

@github-actions github-actions bot temporarily deployed to pull request September 26, 2021 17:47 Inactive
@renovate renovate bot force-pushed the renovate/npm-url-parse-vulnerability branch from 9541623 to 084313f Compare March 7, 2022 08:41
@renovate renovate bot changed the title fix(deps): update dependency url-parse to v1.5.2 [security] fix(deps): update dependency url-parse to v1.5.9 [security] Mar 7, 2022
@github-actions github-actions bot temporarily deployed to pull request March 7, 2022 09:03 Inactive
@renovate renovate bot changed the title fix(deps): update dependency url-parse to v1.5.9 [security] Update dependency url-parse to v1.5.9 [SECURITY] Mar 26, 2022
@renovate renovate bot changed the title Update dependency url-parse to v1.5.9 [SECURITY] fix(deps): update dependency url-parse to v1.5.9 [security] Nov 20, 2022
@renovate renovate bot changed the title fix(deps): update dependency url-parse to v1.5.9 [security] Update dependency url-parse to v1.5.9 [SECURITY] Dec 17, 2022
@renovate renovate bot changed the title Update dependency url-parse to v1.5.9 [SECURITY] fix(deps): update dependency url-parse to v1.5.9 [security] Dec 17, 2022
@renovate
Copy link
Contributor Author

renovate bot commented Mar 25, 2023

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

⚠️ Warning: custom changes will be lost.

@renovate renovate bot changed the title fix(deps): update dependency url-parse to v1.5.9 [security] fix(deps): update dependency url-parse to v1.5.9 [security] - abandoned Apr 3, 2024
Copy link
Contributor Author

renovate bot commented Apr 3, 2024

Autoclosing Skipped

This PR has been flagged for autoclosing. However, it is being skipped due to the branch being already modified. Please close/delete it manually or report a bug if you think this is in error.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant