Am Sun, Jul 10, 2022 at 07:31:30PM +0200 schrieb Moritz Mühlenhoff: > Source: nim > X-Debbugs-CC: t...@security.debian.org > Severity: normal > Tags: security > > Hi, > > The following vulnerability was published for nim. > > CVE-2021-41259[0]: > | Nim is a systems programming language with a focus on efficiency, > | expressiveness, and elegance. In affected versions the uri.parseUri > | function which may be used to validate URIs accepts null bytes in the > | input URI. This behavior could be used to bypass URI validation. For > | example: parseUri("http://localhost\0hello").hostname is set to > | "localhost\0hello". Additionally, httpclient.getContent accepts null > | bytes in the input URL and ignores any data after the first null byte. > | Example: getContent("http://localhost\0hello") makes a request to > | localhost:80. An attacker can use a null bytes to bypass the check and > | mount a SSRF attack. > > https://github.com/nim-lang/security/security/advisories/GHSA-3gg2-rw3q-qwgc
Could we get this fixed for bookworm? Cheers, Moritz