Description
This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter
Remediation
References
https://github.com/fastify/fastify-csrf/pull/26
https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044
Related Vulnerabilities
CVE-2020-7744 Vulnerability in maven package com.mintegral.msdk:alphab
CVE-2023-0044 Vulnerability in maven package io.quarkus:quarkus-vertx-http
CVE-2018-1336 Vulnerability in maven package org.apache.tomcat:tomcat-util
CVE-2016-1000232 Vulnerability in maven package org.webjars.npm:tough-cookie
CVE-2017-16010 Vulnerability in maven package org.webjars.bower:i18next