Description
csrf-lite is a cross-site request forgery protection library for framework-less node sites. csrf-lite uses `===`, a fail first string comparison, instead of a time constant string comparison This enables an attacker to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.
Remediation
References
https://nodesecurity.io/advisories/94
https://github.com/isaacs/csrf-lite/pull/1
Related Vulnerabilities
CVE-2015-5237 Vulnerability in maven package com.google.protobuf:protobuf-java
CVE-2017-16105 Vulnerability in npm package serverwzl
CVE-2022-21126 Vulnerability in maven package com.github.samtools:htsjdk
CVE-2020-11020 Vulnerability in maven package org.webjars.npm:faye
CVE-2023-27162 Vulnerability in maven package org.openapitools:openapi-generator-project