Description
Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-0850 | Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. |
Github GHSA |
GHSA-p7jq-v8jp-j424 | Timing side channel vulnerability in endpoint request handler in Vaadin 15-19 |
References
History
No history.
Status: PUBLISHED
Assigner: Vaadin
Published:
Updated: 2024-09-17T00:02:31.310Z
Reserved: 2021-04-15T00:00:00.000Z
Link: CVE-2021-31406
No data.
Status : Modified
Published: 2021-04-23T16:15:08.727
Modified: 2024-11-21T06:05:35.980
Link: CVE-2021-31406
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA