Miggo Logo

CVE-2023-45128: CSRF Token Reuse Vulnerability

9.6

CVSS Score
3.1

Basic Information

EPSS Score
0.22482%
Published
10/17/2023
Updated
11/11/2023
KEV Status
No
Technology
TechnologyGo

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
Package NameEcosystemVulnerable VersionsFirst Patched Version
github.com/gofiber/fiber/v2go< 2.50.02.50.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from two main issues: 1) Token injection via cookie extraction in safe methods without validation, and 2) Lack of session association in token validation. The New function's handling of safe methods stored cookie tokens directly in storage, while getTokenFromStorage only checked storage existence without session binding. The commit diff shows these functions were modified to add session checks (via sessionManager), constant-time comparisons (compareStrings), and proper referer validation, confirming these were the vulnerable paths.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *ross-Sit* R*qu*st *or**ry (*SR*) vuln*r**ility **s ***n i**nti*i** in t** *ppli**tion, w*i** *llows *n *tt**k*r to inj**t *r*itr*ry v*lu*s *n* *or** m*li*ious r*qu*sts on ****l* o* * us*r. T*is vuln*r**ility **n *llow *n *tt**k*r to inj**t *r*itr*

Reasoning

T** vuln*r**ility st*mm** *rom two m*in issu*s: *) Tok*n inj**tion vi* *ooki* *xtr**tion in s*** m*t*o*s wit*out `v*li**tion`, *n* *) L**k o* s*ssion *sso*i*tion in tok*n `v*li**tion`. T** N*w `*un*tion`'s **n*lin* o* s*** m*t*o*s stor** *ooki* tok*n