Описание
python-engineio vulnerable to Cross-Site Request Forgery (CSRF)
WebSocket cross-origin vulnerability
Impact
This is a Cross-Site Request Forgery (CSRF) vulnerability. It affects Socket.IO and Engine.IO web servers that authenticate clients using cookies.
Patches
python-engineio version 3.9.0 patches this vulnerability by adding server-side Origin header checks.
Workarounds
Do not use cookies for client authentication, or else add a CSRF token to the connection URL.
References
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF) https://www.christian-schneider.net/CrossSiteWebSocketHijacking.html
For more information
If you have any questions or comments about this advisory:
- Open an issue in python-engineio
Ссылки
- https://github.com/miguelgrinberg/python-engineio/security/advisories/GHSA-j3jp-gvr5-7hwq
- https://nvd.nist.gov/vuln/detail/CVE-2019-13611
- https://github.com/miguelgrinberg/python-engineio/issues/128
- https://github.com/advisories/GHSA-j3jp-gvr5-7hwq
- https://github.com/pypa/advisory-database/tree/main/vulns/python-engineio/PYSEC-2019-170.yaml
Пакеты
python-engineio
<= 3.8.2
3.9.0
Связанные уязвимости
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.
An issue was discovered in python-engineio through 3.8.2. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to a server by using a victim's credentials, because the Origin header is not restricted.
An issue was discovered in python-engineio through 3.8.2. There is a C ...
Уязвимость протокола WebSocket веб-сервера Engine.IO, связанная с подделкой межсайтовых закпросов, позволяющая нарушителю выполнять произвольные действия в уязвимой системе