cookie accepts cookie name, path, and domain with out of bounds characters
- Severity:
- Low
Description
The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. For example, serialize("userName=<script>alert('XSS3')</script>; Max-Age=2592000; a", value) would result in "userName=<script>alert('XSS3')</script>; Max-Age=2592000; a=test", setting userName cookie to <script> and ignoring value.
Recommendation
Update the cookie package to the latest compatible version. Followings are version details:
- Affected version(s): < 0.7.0
- Patched version(s): 0.7.0
References
Related Issues
- Server crashes on invalid Cloud Function or Cloud Job name - CVE-2024-29027
- Nuxt Devtools has a Path Traversal: '../filedir - CVE-2024-23657
- Saltcorn Server allows logged-in users to delete arbitrary files because of a path traversal vulnerability - CVE-2024-47818
- Path traversal in webpack-dev-middleware - CVE-2024-29180
- Tags:
- npm
- cookie
Anything's wrong? Let us know Last updated on April 15, 2025