org.webjars.npm:tough-cookie@2.0.0 vulnerabilities

  • latest version

    4.1.4

  • latest non vulnerable version

  • first published

    9 years ago

  • latest version published

    7 months ago

  • licenses detected

  • package manager

  • Direct Vulnerabilities

    Known vulnerabilities in the org.webjars.npm:tough-cookie package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Prototype Pollution

    org.webjars.npm:tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js.

    Affected versions of this package are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. Due to an issue with the manner in which the objects are initialized, an attacker can expose or modify a limited amount of property information on those objects. There is no impact to availability.

    How to fix Prototype Pollution?

    Upgrade org.webjars.npm:tough-cookie to version 4.1.3 or higher.

    [,4.1.3)
    • M
    Regular Expression Denial of Service (ReDoS)

    tough-cookie is RFC6265 Cookies and Cookie Jar for node.js.

    Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks. An attacker may pass a specially crafted cookie, causing the server to hang.

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade to version 2.3.3 or newer.

    [,2.3.3)
    • H
    Regular Expression Denial of Service (ReDoS)

    org.webjars.npm:tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js.

    Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). An attacker can provide a cookie, which nearly matches the pattern being matched. This will cause the regular expression matching to take a long time, all the while occupying the event loop and preventing it from processing other requests and making the server unavailable (a Denial of Service attack).

    How to fix Regular Expression Denial of Service (ReDoS)?

    Upgrade org.webjars.npm:tough-cookie to version 2.3.0 or higher.

    [0.9.7,2.3.0)