First published: Fri Nov 27 2020(Updated: )
This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with an empty X-XSRF-TOKEN header and an empty XSRF-TOKEN cookie.
Credit: report@snyk.io
Affected Software | Affected Version | How to fix |
---|---|---|
Akka HTTP Session | <=0.5.11 |
https://github.com/softwaremill/akka-http-session/commit/57f11663eecb84be03383d164f655b9c5f953b41
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7780 has been classified as a high-severity vulnerability.
To mitigate CVE-2020-7780, upgrade to version 0.5.11 or later of the Akka HTTP Session package.
CVE-2020-7780 can potentially allow unauthorized access to endpoints protected by randomTokenCookie due to insufficient security measures.
CVE-2020-7780 affects versions earlier than 0.5.11 of the Akka HTTP Session package for Scala 2.11, 2.12, and 2.13.
There is no official workaround for CVE-2020-7780; the best course of action is to upgrade to the patched version.