Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-27495

Опубликовано: 20 апр. 2023
Источник: nvd
CVSS3: 5.3
CVSS3: 6.5
EPSS Низкий

Описание

@fastify/csrf-protection is a plugin which helps protect Fastify servers against CSRF attacks. The CSRF protection enforced by the @fastify/csrf-protection library in combination with @fastify/cookie can be bypassed from network and same-site attackers under certain conditions. @fastify/csrf-protection supports an optional userInfo parameter that binds the CSRF token to the user. This parameter has been introduced to prevent cookie-tossing attacks as a fix for CVE-2021-29624. Whenever userInfo parameter is missing, or its value can be predicted for the target user account, network and same-site attackers can 1. fixate a _csrf cookie in the victim's browser, and 2. forge CSRF tokens that are valid for the victim's session. This allows attackers to bypass the CSRF protection mechanism. As a fix, @fastify/csrf-protection starting from version 6.3.0 (and v4.1.0) includes a server-defined secret hmacKey that cryptographically binds the CSRF token to the value of the _csrf cookie and the use

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:fastify:csrf-protection:*:*:*:*:*:node.js:*:*
Версия до 4.1.0 (исключая)
cpe:2.3:a:fastify:csrf-protection:*:*:*:*:*:node.js:*:*
Версия от 5.0.0 (включая) до 6.3.0 (исключая)

EPSS

Процентиль: 29%
0.00107
Низкий

5.3 Medium

CVSS3

6.5 Medium

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 5.3
redhat
почти 3 года назад

@fastify/csrf-protection is a plugin which helps protect Fastify servers against CSRF attacks. The CSRF protection enforced by the @fastify/csrf-protection library in combination with @fastify/cookie can be bypassed from network and same-site attackers under certain conditions. @fastify/csrf-protection supports an optional userInfo parameter that binds the CSRF token to the user. This parameter has been introduced to prevent cookie-tossing attacks as a fix for CVE-2021-29624. Whenever userInfo parameter is missing, or its value can be predicted for the target user account, network and same-site attackers can 1. fixate a _csrf cookie in the victim's browser, and 2. forge CSRF tokens that are valid for the victim's session. This allows attackers to bypass the CSRF protection mechanism. As a fix, @fastify/csrf-protection starting from version 6.3.0 (and v4.1.0) includes a server-defined secret hmacKey that cryptographically binds the CSRF token to the value of the _csrf cookie and the ...

CVSS3: 5.3
github
почти 3 года назад

Bypass of CSRF protection in the presence of predictable userInfo

EPSS

Процентиль: 29%
0.00107
Низкий

5.3 Medium

CVSS3

6.5 Medium

CVSS3

Дефекты

CWE-352