Vulnerability Details : CVE-2017-15010
A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.
Vulnerability category: Denial of service
Exploit prediction scoring system (EPSS) score for CVE-2017-15010
Probability of exploitation activity in the next 30 days: 1.14%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 83 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-15010
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
[email protected] |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
[email protected] |
CWE ids for CVE-2017-15010
-
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.Assigned by: [email protected] (Primary)
References for CVE-2017-15010
-
http://www.securityfocus.com/bid/101185
Third Party Advisory;VDB Entry
-
https://access.redhat.com/errata/RHSA-2017:2913
Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2017:2912
Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:1263
Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:1264
Third Party Advisory
-
https://github.com/salesforce/tough-cookie/issues/92
Issue Tracking;Vendor Advisory
-
https://snyk.io/vuln/npm:tough-cookie:20170905
Patch;Third Party Advisory
-
https://nodesecurity.io/advisories/525
Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/[email protected]/message/6VEBDTGNHVM677SLZDEHMWOP3ISMZSFT/
Products affected by CVE-2017-15010
- cpe:2.3:a:salesforce:tough-cookie:*:*:*:*:*:node.js:*:*