Vulnerabilities/

@fastify/oauth2 vulnerable to Cross Site Request Forgery due to reused Oauth2 state

Severity:
High

Description

All versions of @fastify/oauth2 used a statically generated state parameter at startup time and were used across all requests for all users. The purpose of the Oauth2 state parameter is to prevent Cross-Site-Request-Forgery attacks.

Recommendation

Update the @fastify/oauth2 package to the latest compatible version. Followings are version details:

References

Related Issues

Tags:
npm
@fastify/oauth2
Anything's wrong? Let us know Last updated on November 10, 2023

This issue is available in SmartScanner Professional

See Pricing