[MAVEN:GHSA-P7JQ-V8JP-J424] Timing side channel vulnerability in endpoint request handler in Vaadin 15-19

Severity Moderate
Affected Packages 2
Fixed Packages 2
CVEs 1

Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.

Package Affected Version
pkg:maven/com.vaadin/flow-server = 6.0.0
pkg:maven/com.vaadin/flow-server >= 3.0.0, < 5.0.4
ID
MAVEN:GHSA-P7JQ-V8JP-J424
Severity
moderate
URL
https://github.com/advisories/GHSA-p7jq-v8jp-j424
Published
2021-04-19T14:50:38
(3 years ago)
Modified
2023-02-01T05:05:31
(19 months ago)
Rights
Maven Security Team
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:maven/com.vaadin/flow-server com.vaadin flow-server = 6.0.0
Fixed pkg:maven/com.vaadin/flow-server com.vaadin flow-server = 6.0.1
Affected pkg:maven/com.vaadin/flow-server com.vaadin flow-server >= 3.0.0 < 5.0.4
Fixed pkg:maven/com.vaadin/flow-server com.vaadin flow-server = 5.0.4
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...