| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2022-0691
Vulnerability Database
npm
CVE-2022-0691
Base Score
CRITICAL
9.8
CVE-2022-0691
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.9.
Vector
NETWORK
Published By
security@huntr.dev
Published Date
Feb 21, 2022, 09:15
Affected Versions
(1)
url-parse
(npm)
Introduced
0
Fixed
1.5.9
Limit
N/A
Package (Ecosystem)
Introduced
Fixed
Limit
url-parse
(npm)
0
1.5.9
N/A
Weakness Type (CWE)
:
CWE-639
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
9.8
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Severity
CRITICAL
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH
References
https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63
https://huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4
https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html
https://security.netapp.com/advisory/ntap-20220325-0006/
Base Score
CRITICAL
9.8
Weakness Type (CWE)
:
CWE-639
CVSS Metrics
CVSS v3.1
CVSS v3.0
CVSS v2
Base Score
9.8
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Severity
CRITICAL
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH