tough-cookie@0.9.15 vulnerabilities

RFC6265 Cookies and Cookie Jar for node.js

Direct Vulnerabilities

Known vulnerabilities in the tough-cookie package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Prototype Pollution

tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js.

Affected versions of this package are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. Due to an issue with the manner in which the objects are initialized, an attacker can expose or modify a limited amount of property information on those objects. There is no impact to availability.

How to fix Prototype Pollution?

Upgrade tough-cookie to version 4.1.3 or higher.

<4.1.3
  • M
Regular Expression Denial of Service (ReDoS)

tough-cookie is RFC6265 Cookies and Cookie Jar for node.js.

Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks. An attacker may pass a specially crafted cookie, causing the server to hang.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade to version 2.3.3 or newer.

<2.3.3
  • H
Regular Expression Denial of Service (ReDoS)

tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js.

Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS). An attacker can provide a cookie, which nearly matches the pattern being matched. This will cause the regular expression matching to take a long time, all the while occupying the event loop and preventing it from processing other requests and making the server unavailable (a Denial of Service attack).

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade tough-cookie to version 2.3.0 or higher.

>=0.9.7 <2.3.0