Lack of protection against cookie tossing attacks in fastify-csrf
Moderate severity
GitHub Reviewed
Published
May 14, 2021
in
fastify/csrf-protection
•
Updated Jan 28, 2023
Description
Reviewed
May 17, 2021
Published to the GitHub Advisory Database
May 17, 2021
Published by the National Vulnerability Database
May 19, 2021
Last updated
Jan 28, 2023
Impact
Users that used fastify-csrf with the "double submit" mechanism using cookies with an application deployed across multiple subdomains, e.g. "heroku"-style platform as a service.
Patches
Version 3.1.0 of the fastify-csrf fixes it.
See fastify/csrf-protection#51 and fastify/csrf#2.
The user of the module would need to supply a
userInfo
when generating the CSRF token to fully implement the protection on their end. This is needed only for applications hosted on different subdomains.Workarounds
None available.
References
Credits
This vulnerability was found by Xhelal Likaj [email protected].
For more information
If you have any questions or comments about this advisory:
References