NA

CVE-2023-45128

Published: 16/10/2023 Updated: 23/10/2023
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Fiber is an express inspired web framework written in Go. A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the application, which allows an malicious user to inject arbitrary values and forge malicious requests on behalf of a user. This vulnerability can allow an malicious user to inject arbitrary values without any authentication, or perform various malicious actions on behalf of an authenticated user, potentially compromising the security and integrity of the application. The vulnerability is caused by improper validation and enforcement of CSRF tokens within the application. This issue has been addressed in version 2.50.0 and users are advised to upgrade. Users should take additional security measures like captchas or Two-Factor Authentication (2FA) and set Session cookies with SameSite=Lax or SameSite=Secure, and the Secure and HttpOnly attributes as defense in depth measures. There are no known workarounds for this vulnerability.

Vulnerable Product Search on Vulmon Subscribe to Product

gofiber fiber

Github Repositories

test that this fiber alert is picked up by dependabot.

What is this? This repo is a clone of gofiber/recipes/csrf-with-session with the following changes: The READMEmd file has been updated to reflect the changes made to the repo The gomod file has been updated to use a version of Fiber that has published vulerability alerts for the CSRF middleware A dependabot configuration file has been added to the repo to enable dependabot