Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-1243— CRHTLF can lead to invalid protocol extraction potentially leading to XSS in medialize/uri.js

EPSS 0.33% · P56
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-1243

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
CRHTLF can lead to invalid protocol extraction potentially leading to XSS in medialize/uri.js
Source: NVD (National Vulnerability Database)
Vulnerability Description
CRHTLF can lead to invalid protocol extraction potentially leading to XSS in GitHub repository medialize/uri.js prior to 1.19.11.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Medialize URI.js 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Medialize URI.js是Medialize团队的一款基于Javascript的可用于高效拼接URL的代码库。 Medialize URI.js 1.19.11之前版本存在安全漏洞,该漏洞源于CRHTLF导致无效的协议提取。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
medializemedialize/uri.js unspecified ~ 1.19.11 -

II. Public POCs for CVE-2022-1243

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-1243

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2022-1243

No comments yet


Leave a comment