Skip to content

Commit d547792

Browse files
committed
[security] Add credits for CVE-2022-0691
1 parent ad23357 commit d547792

File tree

1 file changed

+12
-0
lines changed

1 file changed

+12
-0
lines changed

SECURITY.md

+12
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,18 @@ acknowledge your responsible disclosure, if you wish.
3333

3434
## History
3535

36+
> Leading control characters are not removed. This allows an attacker to bypass
37+
> hostname checks and makes the `extractProtocol` method return false positives.
38+
39+
- **Reporter credits**
40+
- Haxatron
41+
- GitHub: [@haxatron](https://github.com/haxatron)
42+
- Twitter: [@haxatron1](https://twitter.com/haxatron1)
43+
- Huntr report: https://www.huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4/
44+
- Fixed in: 1.5.9
45+
46+
---
47+
3648
> A URL with a specified but empty port can be used to bypass authorization
3749
> checks.
3850

0 commit comments

Comments
 (0)