CVE-2023-45128: CSRF Token Reuse Vulnerability
9.6
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.22482%
CWE
Published
10/17/2023
Updated
11/11/2023
KEV Status
No
Technology
Go
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| github.com/gofiber/fiber/v2 | go | < 2.50.0 | 2.50.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from two main issues: 1) Token injection via cookie extraction in safe methods without validation, and 2) Lack of session association in token validation. The New function's handling of safe methods stored cookie tokens directly in storage, while getTokenFromStorage only checked storage existence without session binding. The commit diff shows these functions were modified to add session checks (via sessionManager), constant-time comparisons (compareStrings), and proper referer validation, confirming these were the vulnerable paths.