CVE-2020-28452

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-28452
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-28452.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-28452
Aliases
  • GHSA-4jf5-jggp-g56j
  • SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046674
  • SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046675
  • SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1058933
Published
2021-01-20T18:15:12Z
Modified
2024-05-14T08:06:34.853284Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

This affects the package com.softwaremill.akka-http-session:core2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty.

References

Affected packages

Git / github.com/softwaremill/akka-http-session

Affected ranges

Type
GIT
Repo
https://github.com/softwaremill/akka-http-session
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

release-0.*

release-0.1
release-0.1.2
release-0.1.3
release-0.1.4
release-0.1.4-2.0-M1
release-0.2.0
release-0.2.1
release-0.2.2
release-0.2.3
release-0.2.4
release-0.2.6
release-0.2.7
release-0.3.0
release-0.4.0
release-0.5.0
release-0.5.2
release-0.5.4

release-1.*

release-1.1

v0.*

v0.5.10
v0.5.11
v0.5.5
v0.5.6
v0.5.7
v0.5.8
v0.5.9
v0.6.0