CVE-2022-2216:
Server-Side Request Forgery in parse-url
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.38834%
CWE
Published
6/28/2022
Updated
1/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
parse-url | npm | < 6.0.1 | 6.0.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit 21c72ab introduced a regex (GIT_RE) to detect git-ssh URLs and corrected protocol assignment. Prior to this fix, URLs like 'git@github.com:user/repo.git' were parsed with protocol 'file' instead of 'ssh'. This misclassification could allow SSRF if applications used the parsed protocol/resource to make requests, as attackers could exploit the incorrect parsing to target internal systems. The vulnerability directly stems from the parsing logic in parseUrl, which was updated in the patch.