Vulnerabilities/

Regular Expression Denial of Service in tough-cookie

Severity:
High

Description

Affected versions of tough-cookie are susceptible to a regular expression denial of service.

The amplification on this vulnerability is relatively low - it takes around 2 seconds for the engine to execute on a malicious input which is 50,000 characters in length.

Recommendation

Update the tough-cookie package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
tough-cookie
Anything's wrong? Let us know Last updated on November 29, 2023

This issue is available in SmartScanner Professional

See Pricing