U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2021-41259

Change History

CVE Modified by GitHub, Inc. 4/07/2023 11:15:07 AM

Action Type Old Value New Value
Removed CVSS V3.1
GitHub, Inc. AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

								
						
Removed CVSS V3.1 Reason
A-No limiting factors

								
						
Removed CVSS V3.1 Reason
I-No limiting factors

								
						
Removed CVSS V3.1 Reason
S-Unclear if Scope change occurs

								
						
Removed CWE
GitHub, Inc. CWE-918

								
						
Changed Description
Nim is a systems programming language with a focus on efficiency, expressiveness, and elegance. In affected versions the uri.parseUri function which may be used to validate URIs accepts null bytes in the input URI. This behavior could be used to bypass URI validation. For example: parseUri("http://localhost\0hello").hostname is set to "localhost\0hello". Additionally, httpclient.getContent accepts null bytes in the input URL and ignores any data after the first null byte. Example: getContent("http://localhost\0hello") makes a request to localhost:80. An attacker can use a null bytes to bypass the check and mount a SSRF attack.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Notes: None.
Removed Reference
https://github.com/nim-lang/security/security/advisories/GHSA-3gg2-rw3q-qwgc [Exploit, Third Party Advisory]