A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/101185 | Third Party Advisory VDB Entry |
https://access.redhat.com/errata/RHSA-2017:2912 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2017:2913 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1263 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:1264 | Third Party Advisory |
https://github.com/salesforce/tough-cookie/issues/92 | Issue Tracking Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/ | |
https://nodesecurity.io/advisories/525 | Third Party Advisory |
https://snyk.io/vuln/npm:tough-cookie:20170905 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-10-03T16:00:00
Updated: 2019-06-12T16:06:06
Reserved: 2017-10-03T00:00:00
Link: CVE-2017-15010
JSON object: View
NVD Information
Status : Modified
Published: 2017-10-04T01:29:03.403
Modified: 2023-11-07T02:39:18.513
Link: CVE-2017-15010
JSON object: View
Redhat Information
No data.
CWE