Vulnerability Description
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.
CVSS Score
9.8
CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Url-Parse Project | Url-Parse | < 1.5.9 |
Related Weaknesses (CWE)
References
- https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25ePatchThird Party Advisory
- https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4ExploitPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html
- https://security.netapp.com/advisory/ntap-20220325-0006/Third Party Advisory
- https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25ePatchThird Party Advisory
- https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4ExploitPatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html
- https://security.netapp.com/advisory/ntap-20220325-0006/Third Party Advisory
FAQ
What is CVE-2022-0691?
CVE-2022-0691 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.
How severe is CVE-2022-0691?
CVE-2022-0691 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-0691?
Check the references section above for vendor advisories and patch information. Affected products include: Url-Parse Project Url-Parse.