This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044 | third party advisory |
https://github.com/fastify/fastify-csrf/pull/26 | third party advisory |