Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2021-01-20T12:28:44

Updated: 2024-08-04T17:02:06.925Z

Reserved: 2020-12-13T00:00:00

Link: CVE-2020-35217

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-01-20T13:15:12.440

Modified: 2021-02-02T15:50:45.083

Link: CVE-2020-35217

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-01-20T00:00:00Z

Links: CVE-2020-35217 - Bugzilla