Vulnerabilities/

cookie accepts cookie name, path, and domain with out of bounds characters

Severity:
Low

Description

The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. For example, serialize("userName=<script>alert('XSS3')</script>; Max-Age=2592000; a", value) would result in "userName=<script>alert('XSS3')</script>; Max-Age=2592000; a=test", setting userName cookie to <script> and ignoring value.

Recommendation

Update the cookie package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
cookie
Anything's wrong? Let us know Last updated on April 15, 2025

This issue is available in SmartScanner Professional

See Pricing