New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
security implications of legacy url.parse() should be more clearly documented #31279
Comments
|
https://hackerone.com/reports/678487 has been disclosed. It would be helpful if the documentation was updated to warn about issues such as that. |
jasnell
added a commit
to jasnell/node
that referenced
this issue
Jul 6, 2020
3 tasks
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
url.parse() is "sloppy" with its parsing, so use of it can result in behaviour unexpected by some users that has security implications.
It is marked as deprecated at https://nodejs.org/api/url.html#url_url_parse_urlstring_parsequerystring_slashesdenotehost, but the docs don't specifically call out the security issues, so people won't necessarily know that security is a reason to avoid it.
It also doesn't list the specific (known) security issues, so that its not possible for users of the legacy url.parse() API to determine whether their usage is insecure.
These should be addressed through documentation.
Related
Vulnerability reports in process of disclosure, so link will be dead for a while longer.
The text was updated successfully, but these errors were encountered: