Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
References
Link | Resource |
---|---|
https://github.com/vaadin/flow/pull/9875 | Patch Third Party Advisory |
https://vaadin.com/security/cve-2021-31404 | Vendor Advisory |
https://github.com/vaadin/flow/pull/9875 | Patch Third Party Advisory |
https://vaadin.com/security/cve-2021-31404 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:05
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 1.9
v3 : 4.0 |
References | () https://github.com/vaadin/flow/pull/9875 - Patch, Third Party Advisory | |
References | () https://vaadin.com/security/cve-2021-31404 - Vendor Advisory |
Information
Published : 2021-04-23 16:15
Updated : 2024-11-21 06:05
NVD link : CVE-2021-31404
Mitre link : CVE-2021-31404
CVE.ORG link : CVE-2021-31404
JSON object : View
Products Affected
vaadin
- flow
- vaadin