Moderate severityNVD Advisory· Published Apr 23, 2021· Updated Sep 17, 2024
Timing side channel vulnerability in endpoint request handler in Vaadin 15-19
CVE-2021-31406
Description
Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
com.vaadin:flow-serverMaven | >= 3.0.0, < 5.0.4 | 5.0.4 |
com.vaadin:flow-serverMaven | >= 6.0.0, < 6.0.1 | 6.0.1 |
Affected products
2- Vaadin/flow-serverv5Range: 6.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-p7jq-v8jp-j424ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-31406ghsaADVISORY
- github.com/vaadin/flow/pull/10157ghsax_refsource_MISCWEB
- github.com/vaadin/flow/security/advisories/GHSA-p7jq-v8jp-j424ghsaWEB
- vaadin.com/security/cve-2021-31406ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.