diff --git a/apps/server/package.json b/apps/server/package.json index f1f515fec6..501fd02146 100644 --- a/apps/server/package.json +++ b/apps/server/package.json @@ -63,7 +63,7 @@ "cls-hooked": "4.2.2", "compression": "1.8.0", "cookie-parser": "1.4.7", - "csrf-csrf": "3.2.2", + "csrf-csrf": "4.0.2", "dayjs": "1.11.13", "debounce": "2.2.0", "debug": "4.4.1", diff --git a/apps/server/src/routes/csrf_protection.ts b/apps/server/src/routes/csrf_protection.ts index 391be0aaa7..2b26afbf3e 100644 --- a/apps/server/src/routes/csrf_protection.ts +++ b/apps/server/src/routes/csrf_protection.ts @@ -2,6 +2,8 @@ import { doubleCsrf } from "csrf-csrf"; import sessionSecret from "../services/session_secret.js"; import { isElectron } from "../services/utils.js"; +export const CSRF_COOKIE_NAME = "trilium-csrf"; + const doubleCsrfUtilities = doubleCsrf({ getSecret: () => sessionSecret, cookieOptions: { @@ -10,7 +12,8 @@ const doubleCsrfUtilities = doubleCsrf({ sameSite: "strict", httpOnly: !isElectron // set to false for Electron, see https://github.com/TriliumNext/Notes/pull/966 }, - cookieName: "_csrf" + cookieName: CSRF_COOKIE_NAME, + getSessionIdentifier: (req) => req.session.id }); -export const { generateToken, doubleCsrfProtection } = doubleCsrfUtilities; +export const { generateCsrfToken, doubleCsrfProtection } = doubleCsrfUtilities; diff --git a/apps/server/src/routes/error_handlers.ts b/apps/server/src/routes/error_handlers.ts index 05b05f6a4a..af58be82f1 100644 --- a/apps/server/src/routes/error_handlers.ts +++ b/apps/server/src/routes/error_handlers.ts @@ -3,6 +3,7 @@ import log from "../services/log.js"; import NotFoundError from "../errors/not_found_error.js"; import ForbiddenError from "../errors/forbidden_error.js"; import HttpError from "../errors/http_error.js"; +import { CSRF_COOKIE_NAME } from "./csrf_protection.js"; function register(app: Application) { @@ -14,7 +15,7 @@ function register(app: Application) { && err.code === "EBADCSRFTOKEN"; if (isCsrfTokenError) { - log.error(`Invalid CSRF token: ${req.headers["x-csrf-token"]}, secret: ${req.cookies["_csrf"]}`); + log.error(`Invalid CSRF token: ${req.headers["x-csrf-token"]}, secret: ${req.cookies[CSRF_COOKIE_NAME]}`); return next(new ForbiddenError("Invalid CSRF token")); } diff --git a/apps/server/src/routes/index.ts b/apps/server/src/routes/index.ts index 79a40f1864..60697b156a 100644 --- a/apps/server/src/routes/index.ts +++ b/apps/server/src/routes/index.ts @@ -10,7 +10,7 @@ import protectedSessionService from "../services/protected_session.js"; import packageJson from "../../package.json" with { type: "json" }; import assetPath from "../services/asset_path.js"; import appPath from "../services/app_path.js"; -import { generateToken as generateCsrfToken } from "./csrf_protection.js"; +import { generateCsrfToken } from "./csrf_protection.js"; import type { Request, Response } from "express"; import type BNote from "../becca/entities/bnote.js"; @@ -19,9 +19,10 @@ function index(req: Request, res: Response) { const options = optionService.getOptionMap(); const view = getView(req); - //'overwrite' set to false (default) => the existing token will be re-used and validated - //'validateOnReuse' set to false => if validation fails, generate a new token instead of throwing an error - const csrfToken = generateCsrfToken(req, res, false, false); + const csrfToken = generateCsrfToken(req, res, { + overwrite: false, + validateOnReuse: false // if validation fails, generate a new token instead of throwing an error + }); log.info(`CSRF token generation: ${csrfToken ? "Successful" : "Failed"}`); // We force the page to not be cached since on mobile the CSRF token can be diff --git a/pnpm-lock.yaml b/pnpm-lock.yaml index afc2a604b4..fcb6b06779 100644 --- a/pnpm-lock.yaml +++ b/pnpm-lock.yaml @@ -621,8 +621,8 @@ importers: specifier: 13.0.0 version: 13.0.0(webpack@5.99.8(@swc/core@1.11.24(@swc/helpers@0.5.17))(esbuild@0.25.4)(webpack-cli@6.0.1(webpack@5.98.0))) csrf-csrf: - specifier: 3.2.2 - version: 3.2.2 + specifier: 4.0.2 + version: 4.0.2 dayjs: specifier: 1.11.13 version: 1.11.13 @@ -6960,8 +6960,8 @@ packages: resolution: {integrity: sha512-n63i0lZ0rvQ6FXiGQ+/JFCKAUyPFhLQYJIqKaa+tSJtfKeULF/IDNDAbdnSIxgS4NTuw2b0+lj8LzfITuq+ZxQ==} engines: {node: '>=12.10'} - csrf-csrf@3.2.2: - resolution: {integrity: sha512-E3TgLWX1e+jqigDva+nFItfqa59UZ+gLR56DVNyL/xawBGwQr8o3U4/o1gP9FZmIWLnWCiIl5ni85MghMCNRfg==} + csrf-csrf@4.0.2: + resolution: {integrity: sha512-jWI4uDjZn1EedVSa6WhiL6L6M5XmSemXLgCDGwrdPLtkCThSDDTj4ewokTTqrW8JZYcfJ3oY4LFCtXgQ2XAg5Q==} css-declaration-sorter@6.4.1: resolution: {integrity: sha512-rtdthzxKuyq6IzqX6jEcIzQF/YqccluefyCYheovBOLhFT/drQA9zj/UbRAa9J7C0o6EG6u3E6g+vKkay7/k3g==} @@ -21890,7 +21890,7 @@ snapshots: cross-zip@4.0.1: {} - csrf-csrf@3.2.2: + csrf-csrf@4.0.2: dependencies: http-errors: 2.0.0