Lucene search

K
cve[email protected]CVE-2021-31411
HistoryMay 05, 2021 - 7:15 p.m.

CVE-2021-31411

2021-05-0519:15:08
CWE-379
web.nvd.nist.gov
57
4
cve
2021
31411
security
vulnerability
frontend
build
functionality
temp directory
vaadin

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds.

Affected configurations

NVD
Node
vaadinflowRange2.0.92.5.3
OR
vaadinflowRange3.0.05.0.0
OR
vaadinflowRange6.0.06.0.6
OR
vaadinvaadinRange14.0.314.5.3
OR
vaadinvaadinRange15.0.019.0.5

CNA Affected

[
  {
    "product": "Vaadin",
    "vendor": "Vaadin",
    "versions": [
      {
        "changes": [
          {
            "at": "15.0.0",
            "status": "affected"
          },
          {
            "at": "19.0.0",
            "status": "unaffected"
          },
          {
            "at": "19.0.0",
            "status": "affected"
          }
        ],
        "lessThan": "*",
        "status": "affected",
        "version": "14.0.3",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "flow-server",
    "vendor": "Vaadin",
    "versions": [
      {
        "changes": [
          {
            "at": "3.0.0",
            "status": "affected"
          },
          {
            "at": "6.0.0",
            "status": "unaffected"
          },
          {
            "at": "6.0.0",
            "status": "affected"
          }
        ],
        "lessThan": "*",
        "status": "affected",
        "version": "2.0.9",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

4.6 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%