Description
csrf-lite is a cross-site request forgery protection library for framework-less node sites. csrf-lite uses `===`, a fail first string comparison, instead of a time constant string comparison This enables an attacker to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.
Remediation
References
https://github.com/isaacs/csrf-lite/pull/1
https://nodesecurity.io/advisories/94
Related Vulnerabilities
CVE-2016-10571 Vulnerability in npm package bkjs-wand
CVE-2016-10680 Vulnerability in npm package adamvr-geoip-lite
CVE-2022-37423 Vulnerability in maven package org.neo4j.procedure:apoc
CVE-2018-1000820 Vulnerability in maven package org.neo4j.procedure:apoc
CVE-2022-1274 Vulnerability in maven package org.keycloak:keycloak-services