CVE-2016-1000232Improper Input Validation in Tough-cookie

Severity
5.3MEDIUMNVD
EPSS
0.9%
top 24.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 5
Latest updateOct 10

Description

NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:LExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

NVDsalesforce/tough-cookie0.9.72.2.2
NVDibm/api_connect5.0.6.05.0.6.5+2

Also affects: Openshift Container Platform 3.1, 3.2, 3.3

Patches

🔴Vulnerability Details

3
OSV
ReDoS via long string of semicolons in tough-cookie2018-10-10
GHSA
ReDoS via long string of semicolons in tough-cookie2018-10-10
CVEList
CVE-2016-1000232: NodeJS Tough-Cookie version 22018-09-05

📋Vendor Advisories

1
Red Hat
nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons2016-07-22

💬Community

2
Bugzilla
CVE-2016-1000232 nodejs-tough-cookie: Denial of service via long string of semicolons [fedora-all]2016-07-25
Bugzilla
CVE-2016-1000232 nodejs-tough-cookie: regular expression DoS via Cookie header with many semicolons2016-07-25
CVE-2016-1000232 — Improper Input Validation | cvebase