Follow Redirects improperly handles URLs in the url.parse() function
- Severity:
- Medium
Description
Versions of the package follow-redirects before 1.15.4 are vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname.
Recommendation
Update the follow-redirects
package to the latest compatible version. Followings are version details:
- Affected version(s): < 1.15.4
- Patched version(s): 1.15.4
References
- GHSA-jchw-25xp-jwwc
- security.snyk.io
- lists.fedoraproject.org
- CVE-2023-26159
- CWE-20
- CWE-601
- CAPEC-310
- OWASP 2021-A1
- OWASP 2021-A3
- OWASP 2021-A6
Related Issues
- Vite has an `server.fs.deny` bypass with an invalid `request-target` - CVE-2025-32395
- Redwood is vulnerable to account takeover via dbAuth "forgot-password - Vulnerability
- Exposure of sensitive information in follow-redirects - CVE-2022-0155
- Marp Core allows XSS by improper neutralization of HTML sanitization - CVE-2024-56510
- Tags:
- npm
- follow-redirects
Anything's wrong? Let us know Last updated on January 31, 2024