CVE-2023-26136: Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in...

6.5 CVSS

Description

Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.

Classification

CVE ID: CVE-2023-26136

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.5

Affected Products

Vendor: n/a

Product: tough-cookie

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.49% (probability of being exploited)

EPSS Percentile: 76.15% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873
https://github.com/salesforce/tough-cookie/issues/282
https://github.com/salesforce/tough-cookie/commit/12d474791bb856004e858fdb1c47b7608d09cf6e
https://github.com/salesforce/tough-cookie/releases/tag/v4.1.3
https://lists.debian.org/debian-lts-announce/2023/07/msg00010.html
https://lists.fedoraproject.org/archives/list/[email protected]/message/6PVVPNSAGSDS63HQ74PJ7MZ3MU5IYNVZ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/3HUE6ZR5SL73KHL7XUPAOEL6SB7HUDT2/
https://security.netapp.com/advisory/ntap-20240621-0006/

Timeline