Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. cookiejar
  4. ›
  5. CVE-2022-25901

CVE-2022-25901: cookiejar Regular Expression Denial of Service via Cookie.parse function

January 18, 2023 (updated November 7, 2023)

Versions of the package cookiejar before 2.1.4 is vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression.

References

  • github.com/advisories/GHSA-h452-7996-h45h
  • github.com/bmeck/node-cookiejar/blob/master/cookiejar.js
  • github.com/bmeck/node-cookiejar/pull/39
  • github.com/bmeck/node-cookiejar/pull/39/commits/eaa00021caf6ae09449dde826108153b578348e5
  • nvd.nist.gov/vuln/detail/CVE-2022-25901
  • security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3176681
  • security.snyk.io/vuln/SNYK-JS-COOKIEJAR-3149984

Detect and mitigate CVE-2022-25901 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 2.1.3

Fixed versions

  • 2.1.4

Solution

Upgrade to version 2.1.4 or above.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-1333: Inefficient Regular Expression Complexity

Source file

npm/cookiejar/CVE-2022-25901.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 13 Jan 2025 12:15:35 +0000.