Lucene search

K
vaadinVaadinVAADIN:CVE-2021-31406
HistoryMar 19, 2021 - 12:00 a.m.

Timing side channel vulnerability in endpoint request handler in Vaadin 15-19

2021-03-1900:00:00
vaadin.com
5

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

12.6%

Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. See CWE-208: Observable Timing Discrepancy Description Vaadin applications use different types of tokens for different purposes, such as preventing CSRF, managing Push and Upload requests. The token checking implementation was subject to the theoretical possibility of timing attacks based on how long it takes for a request with invalid token to be rejected. We identified that the previous fix for this issue was incomplete. The CSRF token checking in the Fusion endpoints was neglected. We apologize for pushing out an incomplete fix. These timing attacks could result in exposure of the user’s token, which can be used to blindly submit data on the user’s behalf, without the possibility of reading back the responses, or of opening websockets and listening for published data from the server for that user, which may or may not contain sensitive information due to the application’s nature. The vulnerability is fixed using constant-time comparison for all security tokens to prevent these potential timing attacks. Applications using the affected Vaadin versions should all be updated to the latest maintenance release. Affected products and mitigation Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include: Product version Mitigation Vaadin 15 - 17 No longer supported. Upgrade to 18.0.7 or newer version Vaadin 18.0.0 - 18.0.6 Upgrade to 18.0.7 or newer 18 version Vaadin 19.0.0 Upgrade to 19.0.1 or newer 19 version Please note that Vaadin versions 15-17 are no longer supported and you should update either to the latest 18 version respectively. Artifacts Maven coordinates Vulnerable version Fixed version com.vaadin:flow-server 3.0 - 4.0 N/A com.vaadin:flow-server 5.0.0 - 5.0.3 β‰₯ 5.0.4 com.vaadin:flow-server 6.0.0 β‰₯ 6.0.1 Credit This issue was discovered and responsibly reported by Xhelal Likaj. References PR: https://github.com/vaadin/flow/pull/10157 RELATED: https://vaadin.com/security/2021-02-17

1.9 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

4 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

0.0004 Low

EPSS

Percentile

12.6%

Related for VAADIN:CVE-2021-31406