Lucene search

K
vaadinVaadinVAADIN:CVE-2021-31405
HistoryMar 11, 2021 - 12:00 a.m.

Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17

2021-03-1100:00:00
vaadin.com
8

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.6%

Unsafe validation RegEx in EmailField component in com.vaadin:vaadin-text-field-flow versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10) allows attackers to cause uncontrolled resource consumption by submitting malicious email addresses. See CWE-400: Uncontrolled Resource Consumption Description Regular expression used on server side to validate input of email fields (com.vaadin.flow.component.textfield.EmailField) is subjected to exponential backtracking, which may result in unbound resource consumption and denial of service. To perform such an attack it is enough to enter a malicious email address into any email field and submit a value to the server for validation (it happens automatically when the field is blurred). UI thread of the server can spend an indefinite amount of time (depending on the input) matching this email address to a validation pattern. By repeating this action the attacker may cause thread pool or resource exhaustion, thus making the application unresponsive for normal users. Affected products and mitigation Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include: Product version Mitigation Vaadin 14.0.6 - 14.4.3 Upgrade to 14.4.4 or newer 14 version Vaadin 15 - 16 No longer supported. Upgrade to 17.0.11 or newer version Vaadin 17.0.0 - 17.0.10 Upgrade to 17.0.11 or newer 17 version Please note that Vaadin versions 15-16 are no longer supported and you should update either to the latest 17 version. Artifacts Maven coordinates Vulnerable version Fixed version com.vaadin:vaadin-text-field-flow 2.0.4 - 2.3.2 ≥ 2.3.3 com.vaadin:vaadin-text-field-flow 3.0.0 - 4.0.2 ≥ 4.0.3 References Reference: https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS PR: https://github.com/vaadin/vaadin-flow-components/pull/442

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

45.6%

Related for VAADIN:CVE-2021-31405