Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Affecting node-tough-cookie package, versions <2.3.4+dfsg-1+deb10u1
Threat Intelligence
EPSS
0.21% (60th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN10-NODETOUGHCOOKIE-5759362
- published 7 Jul 2023
- disclosed 1 Jul 2023
Introduced: 1 Jul 2023
CVE-2023-26136 Open this link in a new tabHow to fix?
Upgrade Debian:10
node-tough-cookie
to version 2.3.4+dfsg-1+deb10u1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream node-tough-cookie
package and not the node-tough-cookie
package as distributed by Debian
.
See How to fix?
for Debian:10
relevant fixed versions and status.
Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
References
- https://security-tracker.debian.org/tracker/CVE-2023-26136
- https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e
- https://github.com/salesforce/tough-cookie/issues/282
- https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3
- https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873
- https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/
- https://security.netapp.com/advisory/ntap-20240621-0006/
CVSS Scores
version 3.1