CVE-2021-31408
Published Apr 23, 2021
Last updated 4 years ago
Overview
- Description
- Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.
- Source
- security@vaadin.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.1
- Impact score
- 5.2
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 3.3
- Impact score
- 4.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "138C0A40-EC8F-4F6F-B907-1F5282B83958", "versionEndExcluding": "6.0.0", "versionStartIncluding": "5.0.0" }, { "criteria": "cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9CCDECF-655E-48E5-ADEC-F5189C6E043D", "versionEndExcluding": "6.0.5", "versionStartIncluding": "6.0.0" }, { "criteria": "cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74A5FA0C-C1AE-496E-8601-A9CC193F750E", "versionEndExcluding": "19.0.4", "versionStartIncluding": "19.0.0" }, { "criteria": "cpe:2.3:a:vaadin:vaadin:18.0.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0C90C81-A26F-4686-BC0C-6D86C3620F5C" } ], "operator": "OR" } ] } ]