CVE-2024-47764 Affecting jitsucom-jitsu package, versions <2.8.2-r2
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CHAINGUARDLATEST-JITSUCOMJITSU-8224887
- published 16 Oct 2024
- disclosed 4 Oct 2024
How to fix?
Upgrade Chainguard
jitsucom-jitsu
to version 2.8.2-r2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream jitsucom-jitsu
package and not the jitsucom-jitsu
package as distributed by Chainguard
.
See How to fix?
for Chainguard
relevant fixed versions and status.
cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.