{"id":"BIT-codeigniter-2022-35943","details":"Shield is an authentication and authorization framework for CodeIgniter 4. This vulnerability may allow [SameSite Attackers](https://canitakeyoursubdomain.name/) to bypass the [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html) mechanism with CodeIgniter Shield. For this attack to succeed, the attacker must have direct (or indirect, e.g., XSS) control over a subdomain site (e.g., `https://a.example.com/`) of the target site (e.g., `http://example.com/`). Upgrade to **CodeIgniter v4.2.3 or later** and **Shield v1.0.0-beta.2 or later**. As a workaround: set `Config\\Security::$csrfProtection` to `'session,'`remove old session data right after login (immediately after ID and password match) and regenerate CSRF token right after login (immediately after ID and password match)","aliases":["CVE-2022-35943","GHSA-5hm8-vh6r-2cjq"],"modified":"2024-03-06T11:25:28.861Z","published":"2024-03-06T10:53:45.787Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://codeigniter4.github.io/userguide/libraries/security.htm"},{"type":"WEB","url":"https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite"},{"type":"WEB","url":"https://github.com/codeigniter4/shield/security/advisories/GHSA-5hm8-vh6r-2cjq"},{"type":"WEB","url":"https://jub0bs.com/posts/2021-01-29-great-samesite-confusion"}],"affected":[{"package":{"name":"codeigniter","ecosystem":"Bitnami","purl":"pkg:bitnami/codeigniter"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"4.2.3"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/codeigniter/BIT-codeigniter-2022-35943.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.3"}