Source: nim
X-Debbugs-CC: [email protected]
Severity: normal
Tags: security
Hi,
The following vulnerability was published for nim.
CVE-2021-41259[0]:
| Nim is a systems programming language with a focus on efficiency,
| expressiveness, and elegance. In affected versions the uri.parseUri
| function which may be used to validate URIs accepts null bytes in the
| input URI. This behavior could be used to bypass URI validation. For
| example: parseUri("http://localhost\0hello").hostname is set to
| "localhost\0hello". Additionally, httpclient.getContent accepts null
| bytes in the input URL and ignores any data after the first null byte.
| Example: getContent("http://localhost\0hello") makes a request to
| localhost:80. An attacker can use a null bytes to bypass the check and
| mount a SSRF attack.
https://github.com/nim-lang/security/security/advisories/GHSA-3gg2-rw3q-qwgc
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2021-41259
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41259
Please adjust the affected versions in the BTS as needed.