4.1.4
9 years ago
7 months ago
Known vulnerabilities in the org.webjars.npm:tough-cookie package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.webjars.npm:tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js. Affected versions of this package are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in How to fix Prototype Pollution? Upgrade | [,4.1.3) |
Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks. An attacker may pass a specially crafted cookie, causing the server to hang. How to fix Regular Expression Denial of Service (ReDoS)? Upgrade to version | [,2.3.3) |
org.webjars.npm:tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). An attacker can provide a cookie, which nearly matches the pattern being matched. This will cause the regular expression matching to take a long time, all the while occupying the event loop and preventing it from processing other requests and making the server unavailable (a Denial of Service attack). How to fix Regular Expression Denial of Service (ReDoS)? Upgrade | [0.9.7,2.3.0) |