CVE-2024-47764

NameCVE-2024-47764
Descriptioncookie is a basic HTTP cookie parser and serializer for HTTP servers. The cookie name could be used to set other fields of the cookie, resulting in an unexpected cookie value. A similar escape can be used for path and domain, which could be abused to alter other fields of the cookie. Upgrade to 0.7.0, which updates the validation for name, path, and domain.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
node-cookie (PTS)bullseye0.4.1-1vulnerable
bookworm0.5.0-2vulnerable
sid, trixie0.7.1+~0.6.0-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
node-cookiesource(unstable)0.7.1+~0.6.0-1

Notes

[bookworm] - node-cookie <no-dsa> (Minor issue)
[bullseye] - node-cookie <postponed> (Minor issue; can be fixed in next update)
https://github.com/jshttp/cookie/security/advisories/GHSA-pxg6-pf52-xh8x
https://github.com/jshttp/cookie/pull/167
https://github.com/jshttp/cookie/commit/e10042845354fea83bd8f34af72475eed1dadf5c (v0.7.0)

Search for package or bug name: Reporting problems