
Cloud Vulnerability DB
A community-led vulnerabilities database
decode-uri-component version 0.2.0 is vulnerable to Improper Input Validation resulting in a Denial of Service (DoS) condition. The vulnerability was identified and tracked as CVE-2022-38900, affecting systems using this component for URI decoding operations (NVD, CVE).
The vulnerability occurs when parsing specific malformed URI components, particularly when processing inputs like '%ea%ba%5a%ba'. When such malformed input is processed, it triggers a TypeError with the message 'decodeComponents(...).join is not a function', causing the application to crash (GitHub Issue).
When exploited, this vulnerability can lead to a Denial of Service condition, potentially affecting the availability of applications that rely on the decode-uri-component package for URI parsing functionality (Red Hat).
Various distributions and packages have released updates to address this vulnerability. For example, Red Hat has included fixes in their security advisory RHSA-2023:1742, and Fedora has released updates for affected packages including yarnpkg version 1.22.19-5 (Fedora Update).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."