Vulnerability Details : CVE-2020-7780
This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with an empty X-XSRF-TOKEN header and an empty XSRF-TOKEN cookie.
Vulnerability category: Cross-site request forgery (CSRF)
Products affected by CVE-2020-7780
- cpe:2.3:a:softwaremill:akka-http-session:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-7780
0.37%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-7780
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
6.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
2.8
|
3.4
|
Snyk |
CWE ids for CVE-2020-7780
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-7780
-
https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046654
Cross-site Request Forgery (CSRF) in com.softwaremill.akka-http-session:core_2.12 | SnykPatch;Third Party Advisory
-
https://github.com/softwaremill/akka-http-session/issues/77
CSRF protection can be bypassed · Issue #77 · softwaremill/akka-http-session · GitHubThird Party Advisory
-
https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41
Fix CSRF protection bypass #74 · softwaremill/akka-http-session@57f1166 · GitHubPatch;Third Party Advisory
-
https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1045352
Cross-site Request Forgery (CSRF) in com.softwaremill.akka-http-session:core_2.13 | SnykPatch;Third Party Advisory
-
https://snyk.io/vuln/SNYK-JAVA-COMSOFTWAREMILLAKKAHTTPSESSION-1046655
Cross-site Request Forgery (CSRF) in com.softwaremill.akka-http-session:core_2.11 | SnykPatch;Third Party Advisory
-
https://github.com/softwaremill/akka-http-session/issues/74
CSRF protection can be bypassed with empty header and empty cookie · Issue #74 · softwaremill/akka-http-session · GitHubThird Party Advisory
Jump to