|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Node.js url-parse: open redirect
Synthesis of the vulnerability
An attacker can deceive the user of Node.js url-parse, in order to redirect him to a malicious site.
Vulnerable products: Nodejs Modules ~ not comprehensive.
Severity of this weakness: 1/4.
Consequences of an attack: user access/rights, data reading.
Hacker's origin: internet client.
Creation date: 03/08/2018.
Références of this bulletin: VIGILANCE-VUL-26904.
Description of the vulnerability
The url-parse module can be installed on Node.js.
However, the web service accepts to redirect the victim with no warning, to an external site indicated by the attacker.
An attacker can therefore deceive the user of Node.js url-parse, in order to redirect him to a malicious site.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a computer vulnerability database. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system. The Vigil@nce vulnerability database contains several thousand vulnerabilities.