← Back to CVEs
CVE-2020-28482
MEDIUM5.9
Description
This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter
CVE Details
CVSS v3.1 Score5.9
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionREQUIRED
Published1/19/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
fastify:fastify-csrf
Weaknesses (CWE)
CWE-200CWE-732
References
https://github.com/fastify/fastify-csrf/pull/26(report@snyk.io)
https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044(report@snyk.io)
https://github.com/fastify/fastify-csrf/pull/26(af854a3a-2127-422b-91ae-364da2661108)
https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.