Description
Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
Published: 2021-01-20
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-0807 Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
Github GHSA Github GHSA GHSA-9q69-g5gc-9fgf Cross-Site Request Forgery in Vert.x-Web framework
History

No history.

Subscriptions

Eclipse Vert.x-web
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T17:02:06.925Z

Reserved: 2020-12-13T00:00:00.000Z

Link: CVE-2020-35217

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-01-20T13:15:12.440

Modified: 2024-11-21T05:27:02.353

Link: CVE-2020-35217

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-01-20T00:00:00Z

Links: CVE-2020-35217 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses