5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P
0.003 Low
EPSS
Percentile
67.9%
Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression.
[
{
"product": "cookiejar",
"versions": [
{
"version": "0",
"lessThan": "2.1.4",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
},
{
"product": "org.webjars.npm:cookiejar",
"versions": [
{
"version": "0",
"lessThan": "*",
"status": "affected",
"versionType": "semver"
}
],
"vendor": "n/a"
}
]
github.com/bmeck/node-cookiejar/blob/master/cookiejar.js%23L73
github.com/bmeck/node-cookiejar/pull/39
github.com/bmeck/node-cookiejar/pull/39/commits/eaa00021caf6ae09449dde826108153b578348e5
lists.debian.org/debian-lts-announce/2023/09/msg00008.html
security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681
security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984