CVE-2020-7780 – com.softwaremill.akka-http-session:core_2.11
Package
Manager: maven
Name: com.softwaremill.akka-http-session:core_2.11
Vulnerable Version: >=0 <0.5.11
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00365 pctl0.57755
Details
Cross-Site Request Forgery This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with an empty X-XSRF-TOKEN header and an empty XSRF-TOKEN cookie.
Metadata
Created: 2022-02-09T23:06:40Z
Modified: 2021-04-13T16:52:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/02/GHSA-q42q-523g-3fwv/GHSA-q42q-523g-3fwv.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-q42q-523g-3fwv
Finding: F007
Auto approve: 1