Description
csrf-lite is a cross-site request forgery protection library for framework-less node sites. csrf-lite uses `===`, a fail first string comparison, instead of a time constant string comparison This enables an attacker to guess the secret in no more than (16*18)288 guesses, instead of the 16^18 guesses required were the timing attack not present.
Remediation
References
https://github.com/isaacs/csrf-lite/pull/1
https://nodesecurity.io/advisories/94
Related Vulnerabilities
CVE-2022-26336 Vulnerability in maven package org.apache.poi:poi-scratchpad
CVE-2019-15599 Vulnerability in npm package treekill
CVE-2017-12158 Vulnerability in maven package org.keycloak:keycloak-server-spi-private
CVE-2021-31409 Vulnerability in maven package com.vaadin:vaadin-compatibility-server
CVE-2018-1000195 Vulnerability in maven package org.jenkins-ci.main:jenkins-core