Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

tests passing, linted, and prittified, with all bugfixes from forks / contributors #2

Open
wants to merge 11 commits into
base: master
Choose a base branch
from

Conversation

coolaj86
Copy link

@coolaj86 coolaj86 commented Aug 3, 2021

  • Works with Tough Cookie 4.x
  • base64 encoded data in cookie (due to escaping) fixed
  • tests pass again
  • linted and caught possible errors
  • refactored unsafe block scopes
  • added .prettierrc, .jshintrc, etc similar to original style and formatting

New, Currently Maintained fork

For those finding this issue - if these changes are not accepted - please use the fork at @root/file-cookie-store.

mike442144 and others added 11 commits October 8, 2016 10:32
Update touch cookie to avoid
[email protected]: ReDoS vulnerability parsing Set-Cookie https://nodesecurity.io/advisories/130
As far as I can tell the netscape cookie file format does not specify that the cookie name/value should be URL encoded.
Doing so breaks compatibility with for instance wget when using base64 encoded cookie values.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants