Shield is an authentication and authorization framework for CodeIgniter 4. This vulnerability may allow [SameSite Attackers](https://canitakeyoursubdomain.name/) to bypass the [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html) mechanism with CodeIgniter Shield. For this attack to succeed, the attacker must have direct (or indirect, e.g., XSS) control over a subdomain site (e.g., `https://a.example.com/`) of the target site (e.g., `http://example.com/`). Upgrade to **CodeIgniter v4.2.3 or later** and **Shield v1.0.0-beta.2 or later**. As a workaround: set `Config\Security::$csrfProtection` to `'session,'`remove old session data right after login (immediately after ID and password match) and regenerate CSRF token right after login (immediately after ID and password match)
References
Link | Resource |
---|---|
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite | Third Party Advisory |
https://jub0bs.com/posts/2021-01-29-great-samesite-confusion | Third Party Advisory |
https://codeigniter4.github.io/userguide/libraries/security.htm | Broken Link |
https://github.com/codeigniter4/shield/security/advisories/GHSA-5hm8-vh6r-2cjq | Exploit Mitigation Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-08-12 14:15
Updated : 2022-08-16 09:06
NVD link : CVE-2022-35943
Mitre link : CVE-2022-35943
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
codeigniter
- shield
- codeigniter