cve/2023/CVE-2023-26136.md
2024-06-18 02:51:15 +02:00

24 lines
1.1 KiB
Markdown

### [CVE-2023-26136](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26136)
![](https://img.shields.io/static/v1?label=Product&message=tough-cookie&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%204.1.3%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Prototype%20Pollution&color=brighgreen)
### Description
Versions of the package tough-cookie before 4.1.3 are vulnerable to Prototype Pollution due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. This issue arises from the manner in which the objects are initialized.
### POC
#### Reference
- https://github.com/salesforce/tough-cookie/issues/282
- https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873
#### Github
- https://github.com/CUCUMBERanOrSNCompany/SealSecurityAssignment
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/mathworks/MATLAB-language-server
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/seal-community/patches
- https://github.com/trong0dn/eth-todo-list