CVE-2024-47764 Affecting vitess-20.0 package, versions <20.0.4-r3


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-VITESS200-8548073
  • published22 Dec 2024
  • disclosed4 Oct 2024

Introduced: 4 Oct 2024

CVE-2024-47764  (opens in a new tab)

How to fix?

Upgrade Chainguard vitess-20.0 to version 20.0.4-r3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream vitess-20.0 package and not the vitess-20.0 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

cookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.