icon

We found results for “

CVE-2024-42476

Date: August 15, 2024

In the OAuth library for nim prior to version 0.11, the Authorization Code grant and Implicit grant both rely on the "state" parameter to prevent cross-site request forgery (CSRF) attacks where a resource owner might have their session associated with protected resources belonging to an attacker. When this project is compiled with certain compiler flags set, it is possible that the "state" parameter will not be checked at all, creating a CSRF vulnerability. Version 0.11 checks the "state" parameter using a regular "if" statement or "doAssert" instead of relying on a plain "assert". "doAssert" will achieve the desired behavior even if "-d:danger" or "--assertions:off" is set.

Language: NIM

Severity Score

Severity Score

Weakness Type (CWE)

Cross-Site Request Forgery (CSRF)

CWE-352

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): NONE
Availability (A): NONE

Do you need more information?

Contact Us