Cross-Site Request Forgery in com.softwaremill.akka-http-session:core_2.12
High severity
GitHub Reviewed
Published
Jan 6, 2022
to the GitHub Advisory Database
•
Updated Feb 1, 2023
Package
Affected versions
>= 0.3.0, < 0.6.1
Patched versions
0.6.1
Description
Published by the National Vulnerability Database
Jan 20, 2021
Reviewed
Mar 22, 2021
Published to the GitHub Advisory Database
Jan 6, 2022
Last updated
Feb 1, 2023
This affects the package com.softwaremill.akka-http-session:core_2.12 from 0 and before 0.6.1; all versions of package com.softwaremill.akka-http-session:core_2.11; the package com.softwaremill.akka-http-session:core_2.13 from 0 and before 0.6.1. CSRF protection can be bypassed by forging a request that contains the same value for both the X-XSRF-TOKEN header and the XSRF-TOKEN cookie value, as the check in randomTokenCsrfProtection only checks that the two values are equal and non-empty.
References