Lucene search

K
githubGitHub Advisory DatabaseGHSA-9H6G-6MXG-VVP4
HistoryApr 19, 2021 - 2:47 p.m.

Timing side channel vulnerability in endpoint request handler in Vaadin 15-19

2021-04-1914:47:18
CWE-208
GitHub Advisory Database
github.com
28
vaadin
endpoint request handler
csrf tokens
vulnerability
timing attack
security token
fusion endpoints
software

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS3

4

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0

Percentile

12.6%

Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.

Affected configurations

Vulners
Node
com.vaadinvaadin-bomRange15.0.018.0.7
OR
com.vaadinvaadin-bomMatch19.0.0
VendorProductVersionCPE
com.vaadinvaadin-bom*cpe:2.3:a:com.vaadin:vaadin-bom:*:*:*:*:*:*:*:*
com.vaadinvaadin-bom19.0.0cpe:2.3:a:com.vaadin:vaadin-bom:19.0.0:*:*:*:*:*:*:*

CVSS2

1.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS3

4

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

EPSS

0

Percentile

12.6%