Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7208 | Fastify is a web framework with minimal overhead and plugin architecture. The attacker can use the incorrect `Content-Type` to bypass the `Pre-Flight` checking of `fetch`. `fetch()` requests with Content-Type’s essence as "application/x-www-form-urlencoded", "multipart/form-data", or "text/plain", could potentially be used to invoke routes that only accepts `application/json` content type, thus bypassing any CORS protection, and therefore they could lead to a Cross-Site Request Forgery attack. This issue has been patched in version 4.10.2 and 3.29.4. As a workaround, implement Cross-Site Request Forgery protection using `@fastify/csrf'. |
Github GHSA |
GHSA-3fjj-p79j-c9hh | Fastify: Incorrect Content-Type parsing can lead to CSRF attack |
Wed, 23 Apr 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-23T16:36:24.268Z
Reserved: 2022-09-30T00:00:00.000Z
Link: CVE-2022-41919
Updated: 2024-08-03T12:56:38.544Z
Status : Modified
Published: 2022-11-22T20:15:11.110
Modified: 2024-11-21T07:24:04.130
Link: CVE-2022-41919
OpenCVE Enrichment
No data.
EUVD
Github GHSA