vertx-web is vulnerable to replay attacks. The application does not validate CSRF Tokens with the returned CSRF header/form parameter, allowing a malicious user to conduct a replay attack with previously issued tokens.
access.redhat.com/errata/RHSA-2018:2371
bugs.eclipse.org/bugs/show_bug.cgi?id=536948
bugzilla.redhat.com/show_bug.cgi?id=1600666
github.com/vert-x3/vertx-web/commit/98891b1d9e022b467a3e4674aca4d1889849b1d5
github.com/vert-x3/vertx-web/issues/970
lists.apache.org/thread.html/r10aef585c521f8ef603f5831f9d97a27d920624025131da950e0c62f@%3Ccommits.pulsar.apache.org%3E
lists.apache.org/thread.html/r3fffda8e947edaa359152c8dc4c4ea9c96fd8ced1999bbce92bc6b25@%3Ccommits.pulsar.apache.org%3E
lists.apache.org/thread.html/r59482ebed302aa49ac7e0c51737499746b0d086fcdeb8f90e705951f@%3Ccommits.pulsar.apache.org%3E
lists.apache.org/thread.html/rc5b4ae8a7caae6d3d5b3266cb050823b96dd62b30718b90b778d3d8b@%3Ccommits.pulsar.apache.org%3E