{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-29020","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2023-03-29T17:39:16.144Z","datePublished":"2023-04-21T22:31:56.768Z","dateUpdated":"2025-02-04T19:38:09.698Z"},"containers":{"cna":{"title":"Cross site request forgery token fixation in fastify-passport","problemTypes":[{"descriptions":[{"cweId":"CWE-384","lang":"en","description":"CWE-384: Session Fixation","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-352","lang":"en","description":"CWE-352: Cross-Site Request Forgery (CSRF)","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/fastify/fastify-passport/security/advisories/GHSA-2ccf-ffrj-m4qw","tags":["x_refsource_CONFIRM"],"url":"https://github.com/fastify/fastify-passport/security/advisories/GHSA-2ccf-ffrj-m4qw"},{"name":"https://github.com/fastify/fastify-passport/commit/07c90feab9cba0dd4779e47cfb0717a7e2f01d3d","tags":["x_refsource_MISC"],"url":"https://github.com/fastify/fastify-passport/commit/07c90feab9cba0dd4779e47cfb0717a7e2f01d3d"},{"name":"https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern","tags":["x_refsource_MISC"],"url":"https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern"},{"name":"https://owasp.org/www-community/attacks/csrf","tags":["x_refsource_MISC"],"url":"https://owasp.org/www-community/attacks/csrf"}],"affected":[{"vendor":"fastify","product":"fastify-passport","versions":[{"version":"< 1.1.0","status":"affected"},{"version":">= 2.0.0, < 2.3.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2023-04-21T22:31:56.768Z"},"descriptions":[{"lang":"en","value":"@fastify/passport is a port of passport authentication library for the Fastify ecosystem. The CSRF (Cross-Site Request Forger) protection enforced by the `@fastify/csrf-protection` library, when combined with `@fastify/passport` in affected versions, can be bypassed by network and same-site attackers. `fastify/csrf-protection` implements the synchronizer token pattern (using plugins `@fastify/session` and `@fastify/secure-session`) by storing a random value used for CSRF token generation in the `_csrf` attribute of a user's session. The `@fastify/passport` library does not clear the session object upon authentication, preserving the `_csrf` attribute between pre-login and authenticated sessions. Consequently, CSRF tokens generated before authentication are still valid. Network and same-site attackers can thus obtain a CSRF token for their pre-session, fixate that pre-session in the victim's browser via cookie tossing, and then perform a CSRF attack after the victim authenticates. As a solution, newer versions of `@fastify/passport` include the configuration options: `clearSessionOnLogin (default: true)` and `clearSessionIgnoreFields (default: ['passport', 'session'])` to clear all the session attributes by default, preserving those explicitly defined in `clearSessionIgnoreFields`."}],"source":{"advisory":"GHSA-2ccf-ffrj-m4qw","discovery":"UNKNOWN"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T14:00:14.369Z"},"title":"CVE Program Container","references":[{"name":"https://github.com/fastify/fastify-passport/security/advisories/GHSA-2ccf-ffrj-m4qw","tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://github.com/fastify/fastify-passport/security/advisories/GHSA-2ccf-ffrj-m4qw"},{"name":"https://github.com/fastify/fastify-passport/commit/07c90feab9cba0dd4779e47cfb0717a7e2f01d3d","tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/fastify/fastify-passport/commit/07c90feab9cba0dd4779e47cfb0717a7e2f01d3d"},{"name":"https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern","tags":["x_refsource_MISC","x_transferred"],"url":"https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern"},{"name":"https://owasp.org/www-community/attacks/csrf","tags":["x_refsource_MISC","x_transferred"],"url":"https://owasp.org/www-community/attacks/csrf"}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-04T19:38:02.383186Z","id":"CVE-2023-29020","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-04T19:38:09.698Z"}}]}}