Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWc3cTUtcGpqci1ncXZw

Regular Expression Denial of Service in tough-cookie

Affected versions of tough-cookie are susceptible to a regular expression denial of service.

The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.

If node was compiled using the -DHTTP_MAX_HEADER_SIZE however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.

Recommendation

Update to version 2.3.3 or later.

Permalink: https://github.com/advisories/GHSA-g7q5-pjjr-gqvp
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWc3cTUtcGpqci1ncXZw
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 6 years ago
Updated: 5 months ago


CVSS Score: 7.5
CVSS vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Identifiers: GHSA-g7q5-pjjr-gqvp, CVE-2017-15010
References: Repository: https://github.com/salesforce/tough-cookie
Blast Radius: 46.9

Affected Packages

npm:tough-cookie
Dependent packages: 2,701
Dependent repositories: 1,773,813
Downloads: 149,842,499 last month
Affected Version Ranges: < 2.3.3
Fixed in: 2.3.3
All affected versions: 0.9.0, 0.9.1, 0.9.3, 0.9.4, 0.9.5, 0.9.6, 0.9.7, 0.9.8, 0.9.9, 0.9.11, 0.9.12, 0.9.13, 0.9.14, 0.9.15, 0.10.0, 0.11.0, 0.12.0, 0.12.1, 0.13.0, 1.0.0, 1.1.0, 1.2.0, 2.0.0, 2.1.0, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.3.2
All unaffected versions: 2.3.3, 2.3.4, 2.4.2, 2.4.3, 2.5.0, 3.0.0, 3.0.1, 4.0.0, 4.1.0, 4.1.1, 4.1.2, 4.1.3, 4.1.4