CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://github.com/dinever/golf/pull/24 | third party advisory patch |
https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe | third party advisory patch |
https://github.com/dinever/golf/issues/20 | issue tracking third party advisory |
https://pkg.go.dev/vuln/GO-2020-0045 | third party advisory |