Security Advisories์ถœ์ฒ˜: GitHub Security Advisories์กฐํšŒ์ˆ˜ 4

[url-parse] url-parse Incorrectly parses URLs that include an '@'

By GitHub
2022๋…„ 2์›” 18์ผ
**[url-parse] url-parse Incorrectly parses URLs that include an '@'**

A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular, parse(\"http://@/127.0.0.1\") Will return: { slashes: true, protocol: 'http:', hash: '', query: '', pathname: '/127.0.0.1', auth: '', host: '', port: '', hostname: '', password: '', username: '', origin: 'null', href: 'http:///127.0.0.1' } If the 'hostname' or 'origin' attributes of the output from url-parse are used in security decisions and the final 'href' attribute of the output is then used to make a request, the decision may be incorrect. References https://nvd.nist.gov/vuln/detail/CVE-2022-0639 https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788 https://huntr.dev/bounties/83a6bc9a-b542-4a38-82cd-d995a1481155 https://lists.debian.org/debian-lts-announce/2023/02/msg00030.html https://lists.debian.org/debian-lts-announce/2025/12/msg00024.html https://github.com/advisories/GHSA-8v38-pw62-9cw2

---

**[devsupporter ํ•ด์„ค]**

์ด ๊ธฐ์‚ฌ๋Š” GitHub Security Advisories์—์„œ ์ œ๊ณตํ•˜๋Š” ์ตœ์‹  ๊ฐœ๋ฐœ ๋™ํ–ฅ์ž…๋‹ˆ๋‹ค. ๊ด€๋ จ ๋„๊ตฌ๋‚˜ ๊ธฐ์ˆ ์— ๋Œ€ํ•ด ๋” ์•Œ์•„๋ณด์‹œ๋ ค๋ฉด ์›๋ณธ ๋งํฌ๋ฅผ ์ฐธ๊ณ ํ•˜์„ธ์š”.