Overview
- Description
- Fastify is a web framework with minimal overhead and plugin architecture. The attacker can use the incorrect `Content-Type` to bypass the `Pre-Flight` checking of `fetch`. `fetch()` requests with Content-Type’s essence as "application/x-www-form-urlencoded", "multipart/form-data", or "text/plain", could potentially be used to invoke routes that only accepts `application/json` content type, thus bypassing any CORS protection, and therefore they could lead to a Cross-Site Request Forgery attack. This issue has been patched in version 4.10.2 and 3.29.4. As a workaround, implement Cross-Site Request Forgery protection using `@fastify/csrf'.
- Source
- security-advisories@github.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Weaknesses
- security-advisories@github.com
- CWE-352
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:fastify:fastify:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "F1CB15D8-00EF-409B-8BE4-E1891670B7C6", "versionEndExcluding": "3.29.4", "versionStartIncluding": "3.0.0" }, { "criteria": "cpe:2.3:a:fastify:fastify:*:*:*:*:*:node.js:*:*", "vulnerable": true, "matchCriteriaId": "B1452A5E-6C6B-45D9-B27F-75DE3D457CC4", "versionEndExcluding": "4.10.2", "versionStartIncluding": "4.0.0" } ], "operator": "OR" } ] } ]