Tornado before 3.2.2 sends arbitrary responses that contain a fixed CSRF token and may be sent with HTTP compression, which makes it easier for remote attackers to conduct a BREACH attack and determine this token via a series of crafted requests.
{
"nvd_published_at": "2020-01-24T18:15:00Z",
"severity": "HIGH",
"github_reviewed": true,
"github_reviewed_at": "2024-02-01T20:53:42Z",
"cwe_ids": [
"CWE-203"
]
}