Upstream information
Description
Nim is a systems programming language with a focus on efficiency, expressiveness, and elegance. In affected versions the uri.parseUri function which may be used to validate URIs accepts null bytes in the input URI. This behavior could be used to bypass URI validation. For example: parseUri("http://localhost\0hello").hostname is set to "localhost\0hello". Additionally, httpclient.getContent accepts null bytes in the input URL and ignores any data after the first null byte. Example: getContent("http://localhost\0hello") makes a request to localhost:80. An attacker can use a null bytes to bypass the check and mount a SSRF attack.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 8.6 |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
Access Vector | Network |
Access Complexity | Low |
Privileges Required | None |
User Interaction | None |
Scope | Changed |
Confidentiality Impact | High |
Integrity Impact | None |
Availability Impact | None |
CVSSv3 Version | 3.1 |
- openSUSE-SU-2021:1585-1, published Thu Dec 16 21:44:34 2021
- openSUSE-SU-2021:1592-1, published Sat Dec 18 15:49:41 2021
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Package Hub 15 SP2 |
| Patchnames: openSUSE-2021-1592 |
openSUSE Leap 15.2 |
| Patchnames: openSUSE-2021-1585 |