Vulnerability Details CVE-2022-41919
Fastify is a web framework with minimal overhead and plugin architecture. The attacker can use the incorrect `Content-Type` to bypass the `Pre-Flight` checking of `fetch`. `fetch()` requests with Content-Type’s essence as "application/x-www-form-urlencoded", "multipart/form-data", or "text/plain", could potentially be used to invoke routes that only accepts `application/json` content type, thus bypassing any CORS protection, and therefore they could lead to a Cross-Site Request Forgery attack. This issue has been patched in version 4.10.2 and 3.29.4. As a workaround, implement Cross-Site Request Forgery protection using `@fastify/csrf'.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 21.7%
CVSS Severity
CVSS v3 Score 4.2
Products affected by CVE-2022-41919
-
cpe:2.3:a:fastify:fastify:3.0.0
-
cpe:2.3:a:fastify:fastify:3.0.1
-
cpe:2.3:a:fastify:fastify:3.0.2
-
cpe:2.3:a:fastify:fastify:3.0.3
-
cpe:2.3:a:fastify:fastify:3.1.0
-
cpe:2.3:a:fastify:fastify:3.1.1
-
cpe:2.3:a:fastify:fastify:3.10.0
-
cpe:2.3:a:fastify:fastify:3.10.1
-
cpe:2.3:a:fastify:fastify:3.11.0
-
cpe:2.3:a:fastify:fastify:3.12.0
-
cpe:2.3:a:fastify:fastify:3.13.0
-
cpe:2.3:a:fastify:fastify:3.14.0
-
cpe:2.3:a:fastify:fastify:3.14.1
-
cpe:2.3:a:fastify:fastify:3.14.2
-
cpe:2.3:a:fastify:fastify:3.15.0
-
cpe:2.3:a:fastify:fastify:3.15.1
-
cpe:2.3:a:fastify:fastify:3.16.0
-
cpe:2.3:a:fastify:fastify:3.16.1
-
cpe:2.3:a:fastify:fastify:3.16.2
-
cpe:2.3:a:fastify:fastify:3.17.0
-
cpe:2.3:a:fastify:fastify:3.18.0
-
cpe:2.3:a:fastify:fastify:3.18.1
-
cpe:2.3:a:fastify:fastify:3.19.0
-
cpe:2.3:a:fastify:fastify:3.19.1
-
cpe:2.3:a:fastify:fastify:3.19.2
-
cpe:2.3:a:fastify:fastify:3.2.0
-
cpe:2.3:a:fastify:fastify:3.2.1
-
cpe:2.3:a:fastify:fastify:3.20.0
-
cpe:2.3:a:fastify:fastify:3.20.1
-
cpe:2.3:a:fastify:fastify:3.20.2
-
cpe:2.3:a:fastify:fastify:3.21.0
-
cpe:2.3:a:fastify:fastify:3.21.1
-
cpe:2.3:a:fastify:fastify:3.21.2
-
cpe:2.3:a:fastify:fastify:3.21.3
-
cpe:2.3:a:fastify:fastify:3.21.4
-
cpe:2.3:a:fastify:fastify:3.21.5
-
cpe:2.3:a:fastify:fastify:3.21.6
-
cpe:2.3:a:fastify:fastify:3.22.0
-
cpe:2.3:a:fastify:fastify:3.22.1
-
cpe:2.3:a:fastify:fastify:3.23.0
-
cpe:2.3:a:fastify:fastify:3.23.1
-
cpe:2.3:a:fastify:fastify:3.24.0
-
cpe:2.3:a:fastify:fastify:3.24.1
-
cpe:2.3:a:fastify:fastify:3.25.0
-
cpe:2.3:a:fastify:fastify:3.25.1
-
cpe:2.3:a:fastify:fastify:3.25.2
-
cpe:2.3:a:fastify:fastify:3.25.3
-
cpe:2.3:a:fastify:fastify:3.26.0
-
cpe:2.3:a:fastify:fastify:3.27.0
-
cpe:2.3:a:fastify:fastify:3.27.1
-
cpe:2.3:a:fastify:fastify:3.27.2
-
cpe:2.3:a:fastify:fastify:3.27.3
-
cpe:2.3:a:fastify:fastify:3.27.4
-
cpe:2.3:a:fastify:fastify:3.28.0
-
cpe:2.3:a:fastify:fastify:3.29.0
-
cpe:2.3:a:fastify:fastify:3.29.1
-
cpe:2.3:a:fastify:fastify:3.29.2
-
cpe:2.3:a:fastify:fastify:3.29.3
-
cpe:2.3:a:fastify:fastify:3.3.0
-
cpe:2.3:a:fastify:fastify:3.4.0
-
cpe:2.3:a:fastify:fastify:3.4.1
-
cpe:2.3:a:fastify:fastify:3.5.0
-
cpe:2.3:a:fastify:fastify:3.5.1
-
cpe:2.3:a:fastify:fastify:3.6.0
-
cpe:2.3:a:fastify:fastify:3.7.0
-
cpe:2.3:a:fastify:fastify:3.8.0
-
cpe:2.3:a:fastify:fastify:3.9.0
-
cpe:2.3:a:fastify:fastify:3.9.1
-
cpe:2.3:a:fastify:fastify:3.9.2
-
cpe:2.3:a:fastify:fastify:4.0.0
-
cpe:2.3:a:fastify:fastify:4.0.1
-
cpe:2.3:a:fastify:fastify:4.0.2
-
cpe:2.3:a:fastify:fastify:4.0.3
-
cpe:2.3:a:fastify:fastify:4.1.0
-
cpe:2.3:a:fastify:fastify:4.2.0
-
cpe:2.3:a:fastify:fastify:4.2.1
-
cpe:2.3:a:fastify:fastify:4.3.0
-
cpe:2.3:a:fastify:fastify:4.4.0
-
cpe:2.3:a:fastify:fastify:4.5.0
-
cpe:2.3:a:fastify:fastify:4.5.1
-
cpe:2.3:a:fastify:fastify:4.5.2
-
cpe:2.3:a:fastify:fastify:4.5.3
-
cpe:2.3:a:fastify:fastify:4.6.0
-
cpe:2.3:a:fastify:fastify:4.7.0
-
cpe:2.3:a:fastify:fastify:4.8.0
-
cpe:2.3:a:fastify:fastify:4.8.1