File tree 2 files changed +4
-4
lines changed
2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -188,8 +188,8 @@ export default isXHRAdapterSupported && function (config) {
188
188
// Specifically not if we're in a web worker, or react-native.
189
189
if ( platform . isStandardBrowserEnv ) {
190
190
// Add xsrf header
191
- const xsrfValue = ( config . withCredentials || isURLSameOrigin ( fullPath ) )
192
- && config . xsrfCookieName && cookies . read ( config . xsrfCookieName ) ;
191
+ // regarding CVE-2023-45857 config.withCredentials condition was removed temporarily
192
+ const xsrfValue = isURLSameOrigin ( fullPath ) && config . xsrfCookieName && cookies . read ( config . xsrfCookieName ) ;
193
193
194
194
if ( xsrfValue ) {
195
195
requestHeaders . set ( config . xsrfHeaderName , xsrfValue ) ;
Original file line number Diff line number Diff line change @@ -67,15 +67,15 @@ describe('xsrf', function () {
67
67
} ) ;
68
68
} ) ;
69
69
70
- it ( 'should set xsrf header for cross origin when using withCredentials' , function ( done ) {
70
+ it ( 'should not set xsrf header for cross origin when using withCredentials' , function ( done ) {
71
71
document . cookie = axios . defaults . xsrfCookieName + '=12345' ;
72
72
73
73
axios ( 'http://example.com/' , {
74
74
withCredentials : true
75
75
} ) ;
76
76
77
77
getAjaxRequest ( ) . then ( function ( request ) {
78
- expect ( request . requestHeaders [ axios . defaults . xsrfHeaderName ] ) . toEqual ( '12345' ) ;
78
+ expect ( request . requestHeaders [ axios . defaults . xsrfHeaderName ] ) . toEqual ( undefined ) ;
79
79
done ( ) ;
80
80
} ) ;
81
81
} ) ;
You can’t perform that action at this time.
0 commit comments