Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-35217

Опубликовано: 20 янв. 2021
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat build of Quarkusvertx-webNot affected
Red Hat Integration Camel K 1vertx-webNot affected
Red Hat Integration Service Registryvertx-webNot affected
Red Hat OpenShift Application Runtimesvertx-webNot affected
Red Hat support for Spring Bootvertx-webNot affected
streams for Apache Kafkavertx-webNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-352
https://bugzilla.redhat.com/show_bug.cgi?id=1925220vertx-web: performs an incorrect CSRF verification

EPSS

Процентиль: 36%
0.00154
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 5 лет назад

Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.

CVSS3: 8.8
github
почти 5 лет назад

Cross-Site Request Forgery in Vert.x-Web framework

EPSS

Процентиль: 36%
0.00154
Низкий

8.8 High

CVSS3