Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTg0ZnEtNjYyNi13NWZn

CORS Token Disclosure in crumb

When CORS is enabled on a hapi route handler, it is possible to set a crumb token for a different domain. An attacker would need to have an application consumer visit a site they control, request a route supporting CORS, and then retrieve the token. With this token, they could possibly make requests to non CORS routes as this user.

A configuration and scenario where this would occur is unlikely, as most configurations will set CORS globally (where crumb is not used), or not at all.

Recommendation

Update to version 3.0.0 or greater.

Permalink: https://github.com/advisories/GHSA-84fq-6626-w5fg
JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLTg0ZnEtNjYyNi13NWZn
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: over 6 years ago
Updated: over 1 year ago


Identifiers: GHSA-84fq-6626-w5fg, CVE-2014-7193
References: Repository: https://github.com/spumko/crumb
Blast Radius: 0.0

Affected Packages

npm:crumb
Dependent packages: 24
Dependent repositories: 99
Downloads: 2,486 last month
Affected Version Ranges: < 3.0.0
Fixed in: 3.0.0
All affected versions: 0.0.1, 0.0.2, 0.0.3, 0.0.4, 0.0.5, 0.0.6, 0.0.7, 0.0.8, 0.0.9, 0.1.0, 0.1.1, 0.1.2, 0.1.3, 0.2.0, 0.3.0, 0.3.1, 0.3.2, 1.0.0, 1.1.0, 1.1.1, 1.1.2, 2.0.0, 2.1.0, 2.2.0
All unaffected versions: 3.0.0, 3.0.1, 3.1.0, 3.2.0, 3.3.0, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 5.0.0, 6.0.0, 6.0.1, 6.0.2, 6.0.3, 6.1.0, 7.0.0, 7.1.0, 7.2.0, 7.2.1, 7.2.2, 7.2.3