CVE-2018-12123
28.11.2018, 17:29
Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case "javascript:" (e.g. "javAscript:") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect.Enginsight
Vendor | Product | Version |
---|---|---|
nodejs | node.js | 6.0.0 ≤ 𝑥 < 6.15.0 |
nodejs | node.js | 8.0.0 ≤ 𝑥 < 8.14.0 |
nodejs | node.js | 10.0.0 ≤ 𝑥 < 10.14.0 |
nodejs | node.js | 11.0.0 ≤ 𝑥 < 11.3.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
nodejs |
|
Common Weakness Enumeration
- CWE-115 - Misinterpretation of InputThe software misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
References