Lucene search

K
vaadinVaadinVAADIN:CVE-2023-25500
HistoryJun 22, 2023 - 12:00 a.m.

Possible information disclosure of class and method names in RPC response

2023-06-2200:00:00
vaadin.com
6
vaadin
information disclosure
rpc response
cwe-1295
version
mitigation
upgrade
class names
method names
security vulnerability

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests. See CWE-1295: Debug Messages Revealing Unnecessary Information Description Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests. Affected products and mitigation Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include: Product version Mitigation Vaadin 10.0.0 - 10.0.23 Upgrade to 10.0.24 (Vaadin extended maintenance starting from June 26 2023) Vaadin 11.0.0 - 14.10.1 Upgrade to 14.10.2 or newer Vaadin 15.0.0 - 22.0.28 Upgrade to 22.1.0 (Available on demand) Vaadin 23.0.0 - 23.3.13 Upgrade to 23.3.14 or newer Vaadin 24.0.0 - 24.0.6 Upgrade to 24.0.7 or newer Vaadin 24.1.0.alpha1 - 24.1.0.rc2 Upgrade to 24.1.0 or newer Please note that Vaadin versions 11-13 and 15-22.0 are no longer supported and you should update either to the latest 14, 22.1, 23, 24 version. Artifacts Maven coordinates Vulnerable version Fixed version com.vaadin:flow-server 1.0.0 - 1.0.20 ≥1.0.21 com.vaadin:flow-server 1.1.0 - 2.9.2 ≥2.9.3 com.vaadin:flow-server 3.0.0 - 9.1.1 ≥9.1.2 com.vaadin:flow-server 23.0.0 - 23.3.12 ≥23.3.13 com.vaadin:flow-server 24.0.0 - 24.0.8 ≥24.0.9 com.vaadin:flow-server 24.1.0.alpha1 - 24.1.0.rc3 ≥24.1.0 References https://github.com/vaadin/flow/pull/16935

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

29.7%

Related for VAADIN:CVE-2023-25500