Skip to content

URL parsing in node-forge could lead to undesired behavior.

Low severity GitHub Reviewed Published Jan 6, 2022 in digitalbazaar/forge • Updated Jan 11, 2023

Package

npm node-forge (npm)

Affected versions

< 1.0.0

Patched versions

1.0.0

Description

Impact

The regex used for the forge.util.parseUrl API would not properly parse certain inputs resulting in a parsed data structure that could lead to undesired behavior.

Patches

forge.util.parseUrl and other very old related URL APIs were removed in 1.0.0 in favor of letting applications use the more modern WHATWG URL Standard API.

Workarounds

Ensure code does not directly or indirectly call forge.util.parseUrl with untrusted input.

References

For more information

If you have any questions or comments about this advisory:

References

@davidlehn davidlehn published to digitalbazaar/forge Jan 6, 2022
Reviewed Jan 7, 2022
Published to the GitHub Advisory Database Jan 8, 2022
Last updated Jan 11, 2023

Severity

Low

Weaknesses

CVE ID

No known CVE

GHSA ID

GHSA-gf8q-jrpm-jvxq

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.