Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g7q5-pjjr-gqvp

Опубликовано: 24 июл. 2018
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Regular Expression Denial of Service in tough-cookie

Affected versions of tough-cookie are susceptible to a regular expression denial of service.

The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.

If node was compiled using the -DHTTP_MAX_HEADER_SIZE however, the impact of the vulnerability can be significant, as the primary limitation for the vulnerability is the default max HTTP header length in node.

Recommendation

Update to version 2.3.3 or later.

Пакеты

Наименование

tough-cookie

npm
Затронутые версииВерсия исправления

< 2.3.3

2.3.3

EPSS

Процентиль: 92%
0.08205
Низкий

7.5 High

CVSS3

Дефекты

CWE-400

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.

CVSS3: 5.3
redhat
больше 8 лет назад

A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.

CVSS3: 7.5
nvd
больше 8 лет назад

A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.

CVSS3: 7.5
debian
больше 8 лет назад

A ReDoS (regular expression denial of service) flaw was found in the t ...

EPSS

Процентиль: 92%
0.08205
Низкий

7.5 High

CVSS3

Дефекты

CWE-400