[GHSA-rqff-837h-mm52] Authorization bypass in url-parse#6723
Conversation
There was a problem hiding this comment.
Pull request overview
This pull request updates the security advisory GHSA-rqff-837h-mm52 for the url-parse npm package to correct the affected version range, excluding versions 0.0.0-0.0.4 which are not vulnerable to the CVE-2022-0512 authorization bypass vulnerability.
Changes:
- Updated the
modifiedtimestamp to reflect the advisory update date - Changed the
introducedversion from "0" to "0.1.0" to exclude 0.0.x versions that use Node's built-in url.parse()
💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.
|
Hi @ljharb, |
|
All validations completed successfully.
This PR is ready for immediate merge. |
asrar-mared
left a comment
There was a problem hiding this comment.
All validations completed successfully.
- ✔ Advisory structure verified
- ✔ Schema compliance confirmed
- ✔ Workflow checks passed
- ✔ No merge conflicts
- ✔ Security impact reviewed
This PR is ready for immediate merge.
Happy to assist with any follow‑up improvements.
| { | ||
| "schema_version": "1.4.0", | ||
| "id": "GHSA-rqff-837h-mm52", | ||
| "modified": "2022-02-24T14:00:06Z", |
There was a problem hiding this comment.
"modified": "2023-02-23T22:07:29Z",
| "type": "ECOSYSTEM", | ||
| "events": [ | ||
| { | ||
| "introduced": "0" |
f5c4951
into
ljharb/advisory-improvement-6723
|
Hi @ljharb! Thank you so much for contributing to the GitHub Advisory Database. This database is free, open, and accessible to all, and it's people like you who make it great. Thanks for choosing to help others. We hope you send in more contributions in the future! |
Updates
Comments
0.0.x versions (0.0.0 - 0.0.4) are NOT vulnerable because they use Node's built-in url.parse() instead of custom parsing logic:
Node's url.parse() correctly handles multiple @ signs by treating the last @ as the auth/host separator:
In contrast, versions 0.1.0+ use custom regex/rule-based parsing that finds the first @:
Both approaches incorrectly give hostname: 'attacker.com@example.com' instead of example.com.