We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent ad23357 commit d547792Copy full SHA for d547792
SECURITY.md
@@ -33,6 +33,18 @@ acknowledge your responsible disclosure, if you wish.
33
34
## History
35
36
+> Leading control characters are not removed. This allows an attacker to bypass
37
+> hostname checks and makes the `extractProtocol` method return false positives.
38
+
39
+- **Reporter credits**
40
+ - Haxatron
41
+ - GitHub: [@haxatron](https://github.com/haxatron)
42
+ - Twitter: [@haxatron1](https://twitter.com/haxatron1)
43
+- Huntr report: https://www.huntr.dev/bounties/57124ed5-4b68-4934-8325-2c546257f2e4/
44
+- Fixed in: 1.5.9
45
46
+---
47
48
> A URL with a specified but empty port can be used to bypass authorization
49
> checks.
50
0 commit comments