Description
This affects the package fastify-csrf before 3.0.0. 1. The generated cookie used insecure defaults, and did not have the httpOnly flag on: cookieOpts: { path: '/', sameSite: true } 2. The CSRF token was available in the GET query parameter
Remediation
References
https://snyk.io/vuln/SNYK-JS-FASTIFYCSRF-1062044
https://github.com/fastify/fastify-csrf/pull/26
Related Vulnerabilities
CVE-2019-16728 Vulnerability in maven package org.webjars.npm:dompurify
CVE-2023-41900 Vulnerability in maven package org.eclipse.jetty:jetty-openid
CVE-2018-14732 Vulnerability in maven package org.webjars.npm:webpack-dev-server
CVE-2016-10646 Vulnerability in npm package resourcehacker
CVE-2019-18213 Vulnerability in maven package org.lsp4xml:org.eclipse.lsp4xml.extensions.web