We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-47082

Strawberry GraphQL Cross-Site Request Forgery (CSRF) vulnerability



Description

Strawberry GraphQL is a library for creating GraphQL APIs. Prior to version 0.243.0, multipart file upload support as defined in the GraphQL multipart request specification was enabled by default in all Strawberry HTTP view integrations. This made all Strawberry HTTP view integrations vulnerable to cross-site request forgery (CSRF) attacks if users did not explicitly enable CSRF preventing security mechanism for their servers. Additionally, the Django HTTP view integration, in particular, had an exemption for Django's built-in CSRF protection (i.e., the `CsrfViewMiddleware` middleware) by default. In affect, all Strawberry integrations were vulnerable to CSRF attacks by default. Version `v0.243.0` is the first `strawberry-graphql` including a patch.

Reserved 2024-09-17 | Published 2024-09-25 | Updated 2024-09-25 | Assigner GitHub_M


MEDIUM: 4.6CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L

Problem types

CWE-352: Cross-Site Request Forgery (CSRF)

Product status

< 0.243.0
affected

References

github.com/...wberry/security/advisories/GHSA-79gp-q4wv-33fr

github.com/...ommit/37265b230e511480a9ceace492f9f6a484be1387

strawberry.rocks/docs/breaking-changes/0.243.0

cve.org (CVE-2024-47082)

nvd.nist.gov (CVE-2024-47082)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-47082

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.