tough-cookie@0.9.3 vulnerabilities

RFC6265 Cookies and Cookie Jar for node.js

Direct Vulnerabilities

Known vulnerabilities in the tough-cookie package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Prototype Pollution

tough-cookie is a RFC6265 Cookies and CookieJar module for Node.js.

Affected versions of this package are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. Due to an issue with the manner in which the objects are initialized, an attacker can expose or modify a limited amount of property information on those objects. There is no impact to availability.

How to fix Prototype Pollution?

Upgrade tough-cookie to version 4.1.3 or higher.

<4.1.3
  • M
Regular Expression Denial of Service (ReDoS)

tough-cookie is RFC6265 Cookies and Cookie Jar for node.js.

Affected versions of this package are vulnerable to Regular expression Denial of Service (ReDoS) attacks. An attacker may pass a specially crafted cookie, causing the server to hang.

How to fix Regular Expression Denial of Service (ReDoS)?

Upgrade to version 2.3.3 or newer.

<2.3.3