Description
csrf-lite is a cross-site request forgery protection library for framework-less node sites. csrf-lite uses `===`, a fail first string comparison, instead of a time constant string comparison This enables an attacker to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.
Remediation
References
https://github.com/isaacs/csrf-lite/pull/1
https://nodesecurity.io/advisories/94
Related Vulnerabilities
CVE-2022-2390 Vulnerability in maven package com.google.android.gms:play-services-basement
CVE-2016-4469 Vulnerability in maven package org.apache.archiva:archiva-webapp
CVE-2017-1000189 Vulnerability in npm package ejs
CVE-2022-36918 Vulnerability in maven package org.jenkins-ci.plugins:buckminster
CVE-2022-3224 Vulnerability in maven package org.webjars.npm:parse-url