GHSA-qrgf-9gpc-vrxw

Suggest an improvement
Source
https://github.com/advisories/GHSA-qrgf-9gpc-vrxw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/04/GHSA-qrgf-9gpc-vrxw/GHSA-qrgf-9gpc-vrxw.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qrgf-9gpc-vrxw
Aliases
Related
Published
2023-04-20T21:18:51Z
Modified
2023-11-08T04:12:05.408256Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Bypass of CSRF protection in the presence of predictable userInfo
Details

Description

The CSRF protection enforced by the @fastify/csrf-protection library in combination with @fastify/cookie can be bypassed from network and same-site attackers under certain conditions.

@fastify/csrf-protection supports an optional userInfo parameter that binds the CSRF token to the user. This parameter has been introduced to prevent cookie-tossing attacks as a fix for CVE-2021-29624. Whenever userInfo parameter is missing, or its value can be predicted for the target user account, network and same-site attackers can 1. fixate a _csrf cookie in the victim's browser, and 2. forge CSRF tokens that are valid for the victim's session. This allows attackers to bypass the CSRF protection mechanism.

As a fix, @fastify/csrf-protection starting from version 6.3.0 (and v4.1.0) includes a server-defined secret hmacKey that cryptographically binds the CSRF token to the value of the _csrf cookie and the userInfo parameter, making tokens non-spoofable by attackers. This protection is effective as long as the userInfo parameter is unique for each user.

Patches

This is patched in version 6.3.0 and v4.1.0.

Workarounds

As a workaround, developers can use a random, non-predictable userInfo parameter for each user.

Credits

Database specific
{
    "github_reviewed_at": "2023-04-20T21:18:51Z",
    "cwe_ids": [
        "CWE-352"
    ],
    "nvd_published_at": "2023-04-20T18:15:07Z",
    "severity": "MODERATE",
    "github_reviewed": true
}
References

Affected packages

npm / @fastify/csrf-protection

Package

Name
@fastify/csrf-protection
View open source insights on deps.dev
Purl
pkg:npm/%40fastify/csrf-protection

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.0

npm / @fastify/csrf-protection

Package

Name
@fastify/csrf-protection
View open source insights on deps.dev
Purl
pkg:npm/%40fastify/csrf-protection

Affected ranges

Type
SEMVER
Events
Introduced
5.0.0
Fixed
6.3.0