cookiejar Regular Expression Denial of Service via Cookie.parse function
Moderate severity
GitHub Reviewed
Published
Jan 18, 2023
to the GitHub Advisory Database
•
Updated Jan 23, 2023
Description
Published by the National Vulnerability Database
Jan 18, 2023
Published to the GitHub Advisory Database
Jan 18, 2023
Reviewed
Jan 23, 2023
Last updated
Jan 23, 2023
Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the
Cookie.parse
function and other aspects of the API, which use an insecure regular expression for parsing cookie values. Applications could be stalled for extended periods of time if untrusted input is passed to cookie values or attempted to parse from request headers.Proof of concept:
References