CVE-2022-0528:
Incorrect Authorization in @uppy/companion
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.49492%
CWE
Published
3/4/2022
Updated
6/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
@uppy/companion | npm | < 3.3.1 | 3.3.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from the debug flag enabling TLD validation bypass (require_tld: !debug). This allowed local/internal URLs when debug=true (default in vulnerable versions). The functions validateURL()
, meta, and get()
in url.js
used this flag to weaken security checks, enabling SSRF and internal network probing. The patch replaced debug with allowLocalUrls
(default false) and hardened TLD validation.