Vulnerability Description
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.
CVSS Score
9.1
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Url-Parse Project | Url-Parse | < 1.5.8 |
Related Weaknesses (CWE)
References
- https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53PatchThird Party Advisory
- https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78cExploitIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html
- https://security.netapp.com/advisory/ntap-20220325-0006/Third Party Advisory
- https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53PatchThird Party Advisory
- https://huntr.dev/bounties/55fd06cd-9054-4d80-83be-eb5a454be78cExploitIssue TrackingPatch
- https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html
- https://security.netapp.com/advisory/ntap-20220325-0006/Third Party Advisory
FAQ
What is CVE-2022-0686?
CVE-2022-0686 is a vulnerability with a CVSS score of 9.1 (CRITICAL). Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.8.
How severe is CVE-2022-0686?
CVE-2022-0686 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-0686?
Check the references section above for vendor advisories and patch information. Affected products include: Url-Parse Project Url-Parse.