Unsuppressable vulnerability: BREACH attack possible in CSRF tokens
See original GitHub issueDescribe the bug
Using org.springframework.security:spring-security-core:4.2.12.RELEASE
reports a vulnerability:
BREACH attack possible in CSRF tokens
Suppressing it with:
<suppress>
<gav regex="true">^org\.springframework\.security:spring-security-core:.*$</gav>
<cpe>cpe:/a:pivotal_software:spring_security</cpe>
</suppress>
Changes the log message but doesn’t fully suppress it:
[WARNING]
One or more dependencies were identified with known vulnerabilities in Logbook: Spring Boot Auto Configuration:
spring-security-core-4.2.12.RELEASE.jar (pkg:maven/org.springframework.security/spring-security-core@4.2.12.RELEASE) : BREACH attack possible in CSRF tokens
The report doesn’t include a suppress
button for this.
Version of dependency-check used 5.0.0
Log file
[WARNING]
One or more dependencies were identified with known vulnerabilities in Logbook: Spring Boot Auto Configuration:
spring-security-core-4.2.12.RELEASE.jar (pkg:maven/org.springframework.security/spring-security-core@4.2.12.RELEASE, cpe:2.3:a:pivotal_software:spring_security:4.2.12.release:*:*:*:*:*:*:*) : BREACH attack possible in CSRF tokens
https://github.com/zalando/logbook/pull/533 https://travis-ci.org/zalando/logbook/jobs/543568823
To Reproduce Steps to reproduce the behavior:
- Go to https://github.com/zalando/logbook/pull/533
- Checkout branch
dependabot/maven/org.owasp-dependency-check-maven-5.0.0
- Run
mvn clean verify -D skipTests -P spring4
- See error
Expected behavior I want to suppress this.
Issue Analytics
- State:
- Created 4 years ago
- Comments:5 (1 by maintainers)
Top Results From Across the Web
WS-2016-7107: CSRF tokens in Spring and the BREACH attack
The problem is that CSRF tokens generated by Spring Security are vulnerable to the BREACH attack. The attack is even older – it...
Read more >With BREACH attack, is session-based CSRF token still secure?
If your site is vulnerable to BREACH, an attacker can guess anything in the body of the response one character at a time....
Read more >Cross Site Request Forgery (CSRF) - OWASP Foundation
It's sometimes possible to store the CSRF attack on the vulnerable site itself. Such vulnerabilities are called “stored CSRF flaws”.
Read more >What is CSRF (Cross-site request forgery)? Tutorial & Examples
What is CSRF? · What is the impact of a CSRF attack? · How does CSRF work? · How to construct a CSRF...
Read more >Breach Attack Using CSRF Tokens - Veracode - SourceClear
The attack is possible if CSRF protection in Spring is turned on and HTTP ... Breach Attack Using CSRF Tokens Vulnerability in the...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
The OSS Index Analyzer may bring in vulnerabilities that do not exist in the NVD data feeds. With the release of 5.1.0 you can now suppress these findings using the new 1.3 suppression schema. This ticket should have been closed on 2019-06-28 when 5.1.0 was released .- I apologize that I missed closing this one. An example of the new suppression schema is below (note, ODC is backwards compatible with previous schemas):
I re-enabled OSS index Analyzer and suppressed this vulnerability now like this: