Lucene search

K
githubGitHub Advisory DatabaseGHSA-4M3M-PPVX-XGW9
HistoryApr 21, 2023 - 10:33 p.m.

Session fixation in fastify-passport

2023-04-2122:33:30
CWE-384
GitHub Advisory Database
github.com
38
fastify-passport
session fixation
user authentication
same-site attackers
sessionid regeneration
vulnerability mitigation

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

46.4%

Applications using @fastify/passport for user authentication, in combination with @fastify/session as the underlying session management mechanism, are vulnerable to session fixation attacks from network and same-site attackers.

Details

fastify applications rely on the @fastify/passport library for user authentication. The login and user validation are performed by the authenticate function. When executing this function, the sessionId is preserved between the pre-login and the authenticated session. Network and same-site attackers can hijack the victim’s session by tossing a valid sessionId cookie in the victim’s browser and waiting for the victim to log in on the website.

Fix

As a solution, newer versions of @fastify/passport regenerate sessionId upon login, preventing the attacker-controlled pre-session cookie from being upgraded to an authenticated session.

Credits

Affected configurations

Vulners
Node
fastifypassportRange2.0.0–2.3.0
OR
fastifypassportRange<1.1.0
VendorProductVersionCPE
fastifypassport*cpe:2.3:a:fastify:passport:*:*:*:*:*:*:*:*

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

46.4%

Related for GHSA-4M3M-PPVX-XGW9