Lucene search

K
githubGitHub Advisory DatabaseGHSA-4M3M-PPVX-XGW9
HistoryApr 21, 2023 - 10:33 p.m.

Session fixation in fastify-passport

2023-04-2122:33:30
CWE-384
GitHub Advisory Database
github.com
31
fastify-passport
session fixation
user authentication
same-site attackers
sessionid regeneration
vulnerability mitigation

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

46.5%

Applications using @fastify/passport for user authentication, in combination with @fastify/session as the underlying session management mechanism, are vulnerable to session fixation attacks from network and same-site attackers.

Details

fastify applications rely on the @fastify/passport library for user authentication. The login and user validation are performed by the authenticate function. When executing this function, the sessionId is preserved between the pre-login and the authenticated session. Network and same-site attackers can hijack the victim’s session by tossing a valid sessionId cookie in the victim’s browser and waiting for the victim to log in on the website.

Fix

As a solution, newer versions of @fastify/passport regenerate sessionId upon login, preventing the attacker-controlled pre-session cookie from being upgraded to an authenticated session.

Credits

Affected configurations

Vulners
Node
fastifypassportRange<2.3.0
OR
fastifypassportRange<1.1.0

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

0.001 Low

EPSS

Percentile

46.5%

Related for GHSA-4M3M-PPVX-XGW9