6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
32.8%
The CSRF protection enforced by the @fastify/csrf-protection
library in combination with @fastify/cookie
can be bypassed from network and same-site attackers under certain conditions.
@fastify/csrf-protection
supports an optional userInfo
parameter that binds the CSRF token to the user. This parameter has been introduced to prevent cookie-tossing attacks as a fix for CVE-2021-29624. Whenever userInfo
parameter is missing, or its value can be predicted for the target user account, network and same-site attackers can 1. fixate a _csrf
cookie in the victimβs browser, and 2. forge CSRF tokens that are valid for the victimβs session. This allows attackers to bypass the CSRF protection mechanism.
As a fix, @fastify/csrf-protection
starting from version 6.3.0 (and v4.1.0) includes a server-defined secret hmacKey
that cryptographically binds the CSRF token to the value of the _csrf
cookie and the userInfo
parameter, making tokens non-spoofable by attackers. This protection is effective as long as the userInfo
parameter is unique for each user.
This is patched in version 6.3.0 and v4.1.0.
As a workaround, developers can use a random, non-predictable userInfo
parameter for each user.
CPE | Name | Operator | Version |
---|---|---|---|
@fastify/csrf-protection | ge | 5.0.0 | |
@fastify/csrf-protection | lt | 6.3.0 | |
@fastify/csrf-protection | lt | 4.1.0 |
github.com/advisories/GHSA-qrgf-9gpc-vrxw
github.com/fastify/csrf-protection/commit/be3e5761f37aa05c7c1ac8ed44499c51ecec8058
github.com/fastify/csrf-protection/releases/tag/v4.1.0
github.com/fastify/csrf-protection/releases/tag/v6.3.0
github.com/fastify/csrf-protection/security/advisories/GHSA-qrgf-9gpc-vrxw
github.com/fastify/csrf-protection/security/advisories/GHSA-rc4q-9m69-gqp8
nvd.nist.gov/vuln/detail/CVE-2023-27495
www.cvedetails.com/cve/CVE-2021-29624
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
32.8%