forked from request/request
-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerable version of tough-cookie in use (2.5.0) CVE-2023-26136 #31
Labels
Comments
5 tasks
Just got our pipelines stalled by this as well ): |
Apparently issues here do not get triaged.
|
This is holding up our pipelines as well. Just a heads up that the module in question is |
bump - any chance this gets fixed soon @tgriesser? |
🎉 This issue has been resolved in version 2.88.12 🎉 The release is available on: Your semantic-release bot 📦🚀 |
ffengGP
changed the title
Vulnerable version of touch-cookie in use (2.5.0) CVE-2023-26136
Vulnerable version of tough-cookie in use (2.5.0) CVE-2023-26136
Aug 8, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Summary
The version of
tough-cookie
package in use is 2.5.0, which is old version and is vulnerable to CVE-2023-26136This should be updated to 4.1.3 (or higher). The main cypress release should then also be updated to include this new release of request.
https://www.cve.org/CVERecord?id=CVE-2023-26136
Package:
https://github.com/cypress-io/request/blob/master/package.json
Simplest Example to Reproduce
https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873
Possible Solution
https://security.snyk.io/vuln/SNYK-JS-TOUGHCOOKIE-5672873
The text was updated successfully, but these errors were encountered: