Am Sun, Jul 10, 2022 at 07:31:30PM +0200 schrieb Moritz Mühlenhoff:
> Source: nim
> X-Debbugs-CC: t...@security.debian.org
> Severity: normal
> Tags: security
> 
> Hi,
> 
> The following vulnerability was published for nim.
> 
> CVE-2021-41259[0]:
> | Nim is a systems programming language with a focus on efficiency,
> | expressiveness, and elegance. In affected versions the uri.parseUri
> | function which may be used to validate URIs accepts null bytes in the
> | input URI. This behavior could be used to bypass URI validation. For
> | example: parseUri("http://localhost\0hello";).hostname is set to
> | "localhost\0hello". Additionally, httpclient.getContent accepts null
> | bytes in the input URL and ignores any data after the first null byte.
> | Example: getContent("http://localhost\0hello";) makes a request to
> | localhost:80. An attacker can use a null bytes to bypass the check and
> | mount a SSRF attack.
> 
> https://github.com/nim-lang/security/security/advisories/GHSA-3gg2-rw3q-qwgc

Could we get this fixed for bookworm?

Cheers,
        Moritz

Reply via email to