GHSA-PJ2C-H76W-VV6F
Vulnerability from github – Published: 2022-10-07 21:23 – Updated: 2022-10-07 21:23
VLAI?
Summary
tiny-csrf has openly visible CSRF tokens
Details
Impact
Weak encryption on CSRF so tokens can be read by malicious attackers.
Patches
Problems have been patched as of v1.1.0
Workarounds
Upgrade to v1.1.0
References
https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
For more information
Submit an issue at the github repo
Severity ?
8.1 (High)
{
"affected": [
{
"package": {
"ecosystem": "npm",
"name": "tiny-csrf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.1.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2022-39287"
],
"database_specific": {
"cwe_ids": [
"CWE-319"
],
"github_reviewed": true,
"github_reviewed_at": "2022-10-07T21:23:18Z",
"nvd_published_at": "2022-10-07T20:15:00Z",
"severity": "HIGH"
},
"details": "### Impact\n\nWeak encryption on CSRF so tokens can be read by malicious attackers. \n\n### Patches\n\nProblems have been patched as of v1.1.0\n\n### Workarounds\n\nUpgrade to v1.1.0\n\n### References\n\nhttps://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html \n\n### For more information\n\nSubmit an issue at [the github repo](https://github.com/valexandersaulys/tiny-csrf)",
"id": "GHSA-pj2c-h76w-vv6f",
"modified": "2022-10-07T21:23:18Z",
"published": "2022-10-07T21:23:18Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/valexandersaulys/tiny-csrf/security/advisories/GHSA-pj2c-h76w-vv6f"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-39287"
},
{
"type": "WEB",
"url": "https://github.com/valexandersaulys/tiny-csrf/commit/8eead6da3b56e290512bbe8d20c2c5df3be317ba"
},
{
"type": "PACKAGE",
"url": "https://github.com/valexandersaulys/tiny-csrf"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "tiny-csrf has openly visible CSRF tokens"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…