-
Notifications
You must be signed in to change notification settings - Fork 163
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2023-26136 in tough-cookie #632
Labels
Comments
Some magic bits for "overrides": {
"request": "npm:@cypress/request@^3.0.1",
"tough-cookie": "^4.1.3"
}, My two cents, and hoping it helps. |
This was referenced Feb 16, 2024
PR implementing a fix is here: |
2 tasks
Closed by #701 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description/Steps to reproduce
Found the following CVE for tough-cookie:
CVE-2023-26136 (severity: Medium)
Additional info in salesforce/tough-cookie#282
Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
Link to reproduction sandbox
Expected result
Additional information
The text was updated successfully, but these errors were encountered: