[MAVEN:GHSA-P7JQ-V8JP-J424] Timing side channel vulnerability in endpoint request handler in Vaadin 15-19
Severity
Moderate
Affected Packages
2
Fixed Packages
2
CVEs
1
Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server
versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
Package | Affected Version |
---|---|
pkg:maven/com.vaadin/flow-server | = 6.0.0 |
pkg:maven/com.vaadin/flow-server | >= 3.0.0, < 5.0.4 |
Package | Fixed Version |
---|---|
pkg:maven/com.vaadin/flow-server | = 6.0.1 |
pkg:maven/com.vaadin/flow-server | = 5.0.4 |
- ID
- MAVEN:GHSA-P7JQ-V8JP-J424
- Severity
- moderate
- URL
- https://github.com/advisories/GHSA-p7jq-v8jp-j424
- Published
-
2021-04-19T14:50:38
(3 years ago) - Modified
-
2023-02-01T05:05:31
(19 months ago) - Rights
- Maven Security Team
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:maven/com.vaadin/flow-server | com.vaadin | flow-server | = 6.0.0 | |||
Fixed | pkg:maven/com.vaadin/flow-server | com.vaadin | flow-server | = 6.0.1 | |||
Affected | pkg:maven/com.vaadin/flow-server | com.vaadin | flow-server | >= 3.0.0 < 5.0.4 | |||
Fixed | pkg:maven/com.vaadin/flow-server | com.vaadin | flow-server | = 5.0.4 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |