Lucene search

K
cvelistSnykCVELIST:CVE-2020-28452
HistoryJan 20, 2021 - 12:00 a.m.

CVE-2020-28452 Cross-site Request Forgery (CSRF)

2021-01-2000:00:00
snyk
www.cve.org
3
cve-2020-28452
cross-site request forgery
csrf
com.softwaremill.akka-http-session
package vulnerability
x-xsrf-token header
xsrf-token cookie value
security issue

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

48.0%

This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty.

CNA Affected

[
  {
    "product": "com.softwaremill.akka-http-session:core_2.12",
    "vendor": "n/a",
    "versions": [
      {
        "lessThan": "unspecified",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "0.6.1",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "com.softwaremill.akka-http-session:core_2.11",
    "vendor": "n/a",
    "versions": [
      {
        "lessThan": "unspecified",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "com.softwaremill.akka-http-session:core_2.13",
    "vendor": "n/a",
    "versions": [
      {
        "lessThan": "unspecified",
        "status": "affected",
        "version": "0",
        "versionType": "custom"
      },
      {
        "lessThan": "0.6.1",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

6.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

8.8

Confidence

High

EPSS

0.001

Percentile

48.0%

Related for CVELIST:CVE-2020-28452