CVE-2021-31404
Published Apr 23, 2021
Last updated 4 years ago
Overview
- Description
- Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
- Source
- security@vaadin.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 2.5
- Impact score
- 1.4
- Exploitability score
- 1
- Vector string
- CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- LOW
CVSS 2.0
- Type
- Primary
- Base score
- 1.9
- Impact score
- 2.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:N/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B6B73DE-1089-401A-8E6E-31938A277F6F", "versionEndExcluding": "1.0.14", "versionStartIncluding": "1.0.0" }, { "criteria": "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA762C83-724A-4D14-B4C4-9824799B2999", "versionEndExcluding": "2.0.0", "versionStartIncluding": "1.1.0" }, { "criteria": "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "409F92E2-6634-4596-BD66-FBD46E45E658", "versionEndExcluding": "2.4.7", "versionStartIncluding": "2.0.0" }, { "criteria": "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "796C0FAD-172F-4186-847E-5312F3664734", "versionEndExcluding": "5.0.0", "versionStartIncluding": "3.0.0" }, { "criteria": "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53839127-7CF7-4BDC-BC21-29DF165B2BB0", "versionEndExcluding": "5.0.3", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18A7C1CA-ED82-43FD-A3FC-68CC66D17B96", "versionEndExcluding": "10.0.17", "versionStartIncluding": "10.0.0" }, { "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "06E47D63-52A7-4B6A-B90F-7692D854DECC", "versionEndExcluding": "14.0.0", "versionStartIncluding": "11.0.0" }, { "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C13F08D0-2AB9-4B27-B023-59B9F43626F6", "versionEndExcluding": "14.4.7", "versionStartIncluding": "14.0.0" }, { "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D0B97C7-D17B-4006-AFE6-707F1290E39E", "versionEndExcluding": "17.0.0", "versionStartIncluding": "15.0.0" }, { "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C06D13A9-529D-4523-BA83-AC217FF63808", "versionEndExcluding": "18.0.6", "versionStartIncluding": "18.0.0" } ], "operator": "OR" } ] } ]