CVE-2023-29020
Cross site request forgery token fixation in fastify-passport
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
@fastify/passport is a port of passport authentication library for the Fastify ecosystem. The CSRF (Cross-Site Request Forger) protection enforced by the `@fastify/csrf-protection` library, when combined with `@fastify/passport` in affected versions, can be bypassed by network and same-site attackers. `fastify/csrf-protection` implements the synchronizer token pattern (using plugins `@fastify/session` and `@fastify/secure-session`) by storing a random value used for CSRF token generation in the `_csrf` attribute of a user's session. The `@fastify/passport` library does not clear the session object upon authentication, preserving the `_csrf` attribute between pre-login and authenticated sessions. Consequently, CSRF tokens generated before authentication are still valid. Network and same-site attackers can thus obtain a CSRF token for their pre-session, fixate that pre-session in the victim's browser via cookie tossing, and then perform a CSRF attack after the victim authenticates. As a solution, newer versions of `@fastify/passport` include the configuration options: `clearSessionOnLogin (default: true)` and `clearSessionIgnoreFields (default: ['passport', 'session'])` to clear all the session attributes by default, preserving those explicitly defined in `clearSessionIgnoreFields`.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2023-03-29 CVE Reserved
- 2023-04-21 CVE Published
- 2024-08-02 CVE Updated
- 2024-10-01 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
- CWE-384: Session Fixation
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern | Technical Description | |
https://owasp.org/www-community/attacks/csrf | Technical Description |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/fastify/fastify-passport/commit/07c90feab9cba0dd4779e47cfb0717a7e2f01d3d | 2023-05-03 |
URL | Date | SRC |
---|---|---|
https://github.com/fastify/fastify-passport/security/advisories/GHSA-2ccf-ffrj-m4qw | 2023-05-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fastify Search vendor "Fastify" | Passport Search vendor "Fastify" for product "Passport" | < 1.1.0 Search vendor "Fastify" for product "Passport" and version " < 1.1.0" | node.js |
Affected
| ||||||
Fastify Search vendor "Fastify" | Passport Search vendor "Fastify" for product "Passport" | >= 2.0.0 < 2.3.0 Search vendor "Fastify" for product "Passport" and version " >= 2.0.0 < 2.3.0" | node.js |
Affected
|