Moderate severityNVD Advisory· Published Apr 23, 2021· Updated Sep 16, 2024
Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18
CVE-2021-31404
Description
Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.vaadin:flow-serverMaven | >= 1.0.0, < 1.0.14 | 1.0.14 |
com.vaadin:flow-serverMaven | >= 1.1.0, < 2.4.7 | 2.4.7 |
com.vaadin:flow-serverMaven | >= 3.0.0, < 5.0.3 | 5.0.3 |
Affected products
2- Vaadin/flow-serverv5Range: 1.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-xwg3-qrcg-w9x6ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-31404ghsaADVISORY
- github.com/vaadin/flow/pull/9875ghsax_refsource_MISCWEB
- github.com/vaadin/flow/security/advisories/GHSA-xwg3-qrcg-w9x6ghsaWEB
- vaadin.com/security/cve-2021-31404ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.