Lucene search

K
cvelistGitHub_MCVELIST:CVE-2021-29624
HistoryMay 19, 2021 - 9:15 p.m.

CVE-2021-29624 Lack of protection against cookie tossing attacks in fastify-csrf

2021-05-1921:15:28
CWE-565
GitHub_M
www.cve.org
3
cve-2021-29624
fastify-csrf
csrf attacks
cookie tossing
subdomains
double submit
userinfo
vulnerability

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

6

Confidence

High

EPSS

0.001

Percentile

49.1%

fastify-csrf is an open-source plugin helps developers protect their Fastify server against CSRF attacks. Versions of fastify-csrf prior to 3.1.0 have a “double submit” mechanism using cookies with an application deployed across multiple subdomains, e.g. “heroku”-style platform as a service. Version 3.1.0 of the fastify-csrf fixes it. the vulnerability. The user of the module would need to supply a userInfo when generating the CSRF token to fully implement the protection on their end. This is needed only for applications hosted on different subdomains.

CNA Affected

[
  {
    "product": "fastify-csrf",
    "vendor": "fastify",
    "versions": [
      {
        "status": "affected",
        "version": "< 3.1.0"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

AI Score

6

Confidence

High

EPSS

0.001

Percentile

49.1%