Description
This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter
Remediation
References
https://github.com/fastify/fastify-csrf/pull/26
https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044
Related Vulnerabilities
CVE-2016-10735 Vulnerability in maven package li.rudin.mavenjs:bootstrap
CVE-2015-5262 Vulnerability in maven package org.apache.httpcomponents:httpclient
CVE-2022-42003 Vulnerability in maven package com.fasterxml.jackson.core:jackson-databind
CVE-2019-10329 Vulnerability in maven package org.jenkins-ci.plugins:influxdb
CVE-2007-5333 Vulnerability in maven package tomcat:tomcat-coyote