Skip to content

2 vulnerabilities found by github's Security check

Moderate
random-letter-generator published GHSA-73mv-7869-69v2 Jan 3, 2025

Package

No package listed

Affected versions

v0.1.0

Patched versions

None

Description

Description

Two vulnerabilities have been identified:

  1. Prototype Pollution in tough-cookie:
    Allows attackers to manipulate object prototypes, potentially leading to denial of service or arbitrary code execution.

  2. Server-Side Request Forgery (SSRF) in request:
    Enables attackers to make unauthorized network requests, potentially exposing sensitive internal systems.

Impact

  • tough-cookie users who process untrusted cookies are at risk of prototype pollution attacks.
  • request users are vulnerable to SSRF if they accept unvalidated user input for constructing HTTP requests.

Workarounds

To mitigate risks:

  • Avoid using tough-cookie and request. Switch to alternative packages.
  • If unavoidable, validate and sanitize all user input to prevent exploitation.

Affected Versions

  • tough-cookie: All versions up to and including v0.1.0
  • request: All versions up to and including v0.1.0

Patched Versions

  • No patched versions are available for either tough-cookie or request as of now.

References

Severity

Moderate

CVE ID

No known CVE

Weaknesses

No CWEs