{"containers":{"cna":{"affected":[{"product":"Node.js","vendor":"The Node.js Project","versions":[{"status":"affected","version":"All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0"}]}],"datePublic":"2018-11-28T00:00:00.000Z","descriptions":[{"lang":"en","value":"Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-115","description":"CWE-115: Misinterpretation of Input","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-03-20T20:06:13.000Z","orgId":"386269d4-a6c6-4eaa-bf8e-bc0b0d010558","shortName":"nodejs"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"},{"name":"RHSA-2019:1821","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:1821"},{"name":"GLSA-202003-48","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/202003-48"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve-request@iojs.org","ID":"CVE-2018-12123","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Node.js","version":{"version_data":[{"version_value":"All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0"}]}}]},"vendor_name":"The Node.js Project"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Node.js: All versions prior to Node.js 6.15.0, 8.14.0, 10.14.0 and 11.3.0: Hostname spoofing in URL parser for javascript protocol: If a Node.js application is using url.parse() to determine the URL hostname, that hostname can be spoofed by using a mixed case \"javascript:\" (e.g. \"javAscript:\") protocol (other protocols are not affected). If security decisions are made about the URL based on the hostname, they may be incorrect."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-115: Misinterpretation of Input"}]}]},"references":{"reference_data":[{"name":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/","refsource":"CONFIRM","url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"},{"name":"RHSA-2019:1821","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:1821"},{"name":"GLSA-202003-48","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/202003-48"}]}}},"adp":[{"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"},{"name":"RHSA-2019:1821","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:1821"},{"name":"GLSA-202003-48","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/202003-48"},{"url":"https://security.netapp.com/advisory/ntap-20241213-0008/"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-12-13T13:09:21.262Z"}}]},"cveMetadata":{"assignerOrgId":"386269d4-a6c6-4eaa-bf8e-bc0b0d010558","assignerShortName":"nodejs","cveId":"CVE-2018-12123","datePublished":"2018-11-28T17:00:00.000Z","dateReserved":"2018-06-11T00:00:00.000Z","dateUpdated":"2024-12-13T13:09:21.262Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}