Description
Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3561-1 | node-cookiejar security update |
EUVD |
EUVD-2023-0478 | Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression. |
Github GHSA |
GHSA-h452-7996-h45h | cookiejar Regular Expression Denial of Service via Cookie.parse function |
References
History
Thu, 03 Apr 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 13 Feb 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression. | Versions of the package cookiejar before 2.1.4 are vulnerable to Regular Expression Denial of Service (ReDoS) via the Cookie.parse function, which uses an insecure regular expression. |
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-04-03T19:33:00.360Z
Reserved: 2022-02-24T11:58:22.541Z
Link: CVE-2022-25901
Updated: 2024-08-03T04:49:44.454Z
Status : Modified
Published: 2023-01-18T05:15:11.860
Modified: 2025-02-13T17:15:39.400
Link: CVE-2022-25901
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Github GHSA