Skip to content

Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18

Moderate
fluorumlabs published GHSA-xwg3-qrcg-w9x6 Apr 16, 2021

Package

maven com.vaadin:flow-server (Maven)

Affected versions

>=1.0.0, <=1.0.13, >=1.1.0, <2.0.0, >=2.0.0, <=2.4.6, >=3.0.0, <5.0.0, >=5.0.0, <=5.0.2

Patched versions

1.0.14, 2.4.7, 5.0.3

Description

Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 through 13), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaadin 15 prior to 18), and 5.0.0 through 5.0.2 (Vaadin 18.0.0 through 18.0.5) allows attacker to guess a security token via timing attack.

Severity

Moderate
4.0
/ 10

CVSS base metrics

Attack vector
Local
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

CVE ID

CVE-2021-31404

Weaknesses