First published: Sat Jul 01 2023(Updated: )
Salesforce tough-cookie could allow a remote attacker to execute arbitrary code on the system, caused by a prototype pollution flaw due to improper handling of Cookies when using CookieJar in rejectPublicSuffixes=false mode. By adding or modifying properties of Object.prototype using a __proto__ or constructor payload, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Credit: report@snyk.io report@snyk.io report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
npm/tough-cookie | <4.1.3 | 4.1.3 |
Salesforce Tough-Cookie | <4.1.3 | |
redhat/tough-cookie | <4.1.3 | 4.1.3 |
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.2 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.1 | |
IBM Watson Query with Cloud Pak for Data as a Service | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-26136 has a high severity rating due to the potential for remote code execution caused by the prototype pollution vulnerability.
To fix CVE-2023-26136, upgrade to the patched version of tough-cookie, specifically version 4.1.3 or later.
CVE-2023-26136 affects Salesforce tough-cookie and IBM Cognos Analytics across several versions.
CVE-2023-26136 can be exploited through the improper handling of Cookies in the rejectPublicSuffixes=false mode.
Yes, CVE-2023-26136 can be exploited by remote attackers to execute arbitrary code on affected systems.