Cross-site request forgery High

Insecure configuration can lead to a cross-site request forgery (CRSF) vulnerability. This can enable an attacker to trick end users into performing unwanted actions while authenticated.

Detector ID
javascript/cross-site-request-forgery@v1.0
Category

Noncompliant example

1var express = require('express')
2var app = express()
3function crossSiteRequestForgeryNoncompliant()
4{
5    app.get("/", (req, res) => {
6        // Noncompliant: `sameSite` is set to 'none'.
7        res.cookie('cookieName', 'cookieValue', { sameSite: 'none', secure: true })
8        res.render("index.html")
9    })
10}

Compliant example

1var express = require('express')
2var app = express()
3function crossSiteRequestForgeryCompliant()
4{
5    app.get("/", (req, res) => {
6        // Compliant: `sameSite` is set to 'lax'.
7        res.cookie('cookieName', 'cookieValue', { sameSite: 'lax', secure: true })
8        res.render("index.html")
9    })
10}