GHSA-g7q5-pjjr-gqvp

Suggest an improvement
Source
https://github.com/advisories/GHSA-g7q5-pjjr-gqvp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-g7q5-pjjr-gqvp/GHSA-g7q5-pjjr-gqvp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g7q5-pjjr-gqvp
Aliases
Published
2018-07-24T20:14:39Z
Modified
2023-11-08T03:58:56.101045Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
Regular Expression Denial of Service in tough-cookie
Details

Affected versions of tough-cookie are susceptible to a regular expression denial of service.

The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.

If node was compiled using the -DHTTP_MAX_HEADER_SIZE however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.

Recommendation

Update to version 2.3.3 or later.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-400"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:36:20Z"
}
References

Affected packages

npm / tough-cookie

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.3.3

Ecosystem specific

{
    "affected_functions": [
        "(tough-cookie).Cookie.parse"
    ]
}