CVE-2023-26159: Improper Input Validation
(updated )
Versions of the package follow-redirects before 1.15.4 is vulnerable to Improper Input Validation due to the improper handling of URLs by the url.parse() function. When new URL() throws an error, it can be manipulated to misinterpret the hostname. An attacker could exploit this weakness to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
References
- github.com/advisories/GHSA-jchw-25xp-jwwc
- github.com/follow-redirects/follow-redirects/commit/7a6567e16dfa9ad18a70bfe91784c28653fbf19d
- github.com/follow-redirects/follow-redirects/issues/235
- github.com/follow-redirects/follow-redirects/pull/236
- nvd.nist.gov/vuln/detail/CVE-2023-26159
- security.snyk.io/vuln/SNYK-JS-FOLLOWREDIRECTS-6141137
Detect and mitigate CVE-2023-26159 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →